{"title":"The Pivotal Role of Tera-scale Performance in Future Networks: Sequoia vs Multi-core Teraflop Chip","authors":"Samreen Amir, M. Asif, M. Mustafa","doi":"10.1109/ICFN.2010.97","DOIUrl":"https://doi.org/10.1109/ICFN.2010.97","url":null,"abstract":"With the increasing greed for the high data rates and maximum bandwidth utilization, the technology improvement and enhancement is been exponential in the current decade. Researchers hope that massive parallel processing (MPP) computing equipment will provide processing rates of 10 trillion or quadrillion floating-point operations per second. It would allow scientists to build models of phenomena that have never before been imitated. Many vendors are busy in the research and development of such speedy machines. This paper will provide a comparative analysis of the future high computing machines in terms of speed, size applications, architecture and affordability. A predictive conclusion regarding the dominance of one on the other will also be drawn on the basis of this comparison.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131789934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Conceptual Approach against Next Generation Security Threats: Securing a High Speed Network Protocol - UDT","authors":"D. Bernardo, D. Hoang","doi":"10.1109/ICFN.2010.80","DOIUrl":"https://doi.org/10.1109/ICFN.2010.80","url":null,"abstract":"Various technologies have emerged since the Internet protocols were first introduced. Many of these technologies were compellingly complex to implement that it was thought that the existing Internet would have to be redesigned in order to accommodate them. While these proved to be false, security, however, remains to be a major challenge that current and future network designs should accommodate to achieve survivable and secure networks. This paper reaffirms that future network security can be effectively addressed on the lower-level by introducing an identity packet for network protocols. In this paper, we will focus on the newly developed network protocols, such as UDT, a considered next generation protocol. This original work is aimed at providing another way of securing high speed network protocols such as UDT.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130513795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tomlinson-Harashima Precoding in the Physical Network Coded Two Way MIMO Relay Channels","authors":"Peng Gong, Jie Xu, Lin Qiu","doi":"10.1109/ICFN.2010.36","DOIUrl":"https://doi.org/10.1109/ICFN.2010.36","url":null,"abstract":"This paper considers precoding schemes in physical network coded two-way MIMO relay channels. We propose a lattice reduction aided Tomlinson-Harashima Precoding(THP) scheme at first, and compare it with the existing amplify-and-forward (AF) scheme zero-forcing (ZF) schemes traditional decode-and-forward (DF) scheme and network coding (NC) scheme. Simulations show that the proposed scheme outperforms the existing schemes. This improvement is because we have combined the advantages of both THP and lattice reduction thus the effective transmitting power is significantly increased.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133769079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A load-balancing scheme based on Bloom Filters","authors":"C. Gou, Rongcai Zhao, Jing Diao","doi":"10.1109/ICFN.2010.37","DOIUrl":"https://doi.org/10.1109/ICFN.2010.37","url":null,"abstract":"Traditional intrusion detection equipments hardly satisfy the application requirements as the data rates of modern networks rise. Adaptive load balancing algorithm (Adaptive HRW Hashing) may make attacks undetected due to flow remapping. So, the load balancing algorithms in network intrusion detection system (NIDS) are firstly studied, and then a load balancing algorithm based on Bloom Filters is proposed. Experimental data shows that the algorithm has the similar load balancing effect, but with a lower rate of flow remapping.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134293475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Research on the Mutual Benefit Stereotypia of Product Theory and Empirical Based on the Relationship Value","authors":"Jingdong Chen, Jiao Xue","doi":"10.1109/ICFN.2010.81","DOIUrl":"https://doi.org/10.1109/ICFN.2010.81","url":null,"abstract":"Product benefits positioning theory has been well-known; it can create differences in product value. However, the product development to post-industrial society, not only the interests of the differences, but also produced a level of mutual (mutual benefit create relationship value). In this paper, the mutual benefit stereotypic Theory which based on relationship value is put forward. From the goods, services and network three-pronged and take fit as the intermediary, to build mutual benefit stereotyped theoretical model, and select the car as the empirical object of study, verify the relationship between the key dimensions of mutual benefit and the relationship value.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"598 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133868098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Topology Control in Wireless Sensor Networks","authors":"Zheng Gengzhong, Liu Qiumei","doi":"10.1109/ICFN.2010.31","DOIUrl":"https://doi.org/10.1109/ICFN.2010.31","url":null,"abstract":"Topology control is one of the fundamental problems in WSNs (wireless sensor networks). It is of great importance for prolong lifetime, reducing radio interference, for prolong lifetime, increasing the efficiency of MCA (media access control)protocols and routing protocols, ensure the quality of connectivity and coverage, increasing the network service and so on. In this survey paper, different network models are presented, and discusses several graph models used in topology control, the representative research works are introduced through analyses power control and sleep scheduling. The present hot spots and the future trends on the research of topology control are summarized also.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123975513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Shared Access Method for IMS-Based Services","authors":"Xue-xia Li, Fan Zhang, P. Verma","doi":"10.1109/ICFN.2010.99","DOIUrl":"https://doi.org/10.1109/ICFN.2010.99","url":null,"abstract":"IMS as an IP connectivity and service control architecture is increasingly drawing more attention as the future architecture of the core network. At the same time, the cellular backhauled Wi-Fi has been constantly gaining ground as data rates of commercial cellular network continue to increase rapidly while the cost of data services declines at a similar pace. This paper presents a methodology using which IMS-based services can be offered to multiple user devices across a Wi-Fi network. The primary user in the case considered is a bona fide IMS user and Wi-Fi network backhauled by a cellular network. The proposed shared services method will enable sharing of IMS-based services that a UMTS/IMS user has subscribed to, by taking advantage of the authentication scheme specified in 3GPP TR 33.978 security aspects of early IMS, and the availability of cellular backhauled Wi-Fi network.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127817844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Behavioural Correlation for Detecting P2P Bots","authors":"Yousof Al-Hammadi, U. Aickelin","doi":"10.1109/ICFN.2010.72","DOIUrl":"https://doi.org/10.1109/ICFN.2010.72","url":null,"abstract":"In the past few years, IRC bots, malicious programs which are remotely controlled by attackers through IRC servers, have become a major threat to the Internet and for users. These bots can be used in different malicious ways such as issuing distributed denial of services attacks to shut down other networks and services, keystrokes logging, spamming,traffic sniffing cause serious disruption on networks and users. New bots use peer to peer (P2P) protocols start to appear as the upcoming threat to Internet security due to the fact that P2P bots do not have a centralized point to shutdown or trace back, thus making the detection of P2P bots is a real challenge. In response to these threats, we present an algorithm to detect an individual P2P bot running on a system by correlating its activities. Our evaluation shows that correlating different activities generated by P2P bots within a specified time period can detect these kind of bots.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124238429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Robust Particle Filter for People Tracking","authors":"Bo Yang, Xinting Pan, Aidong Men, Xiaobo Chen","doi":"10.1109/ICFN.2010.34","DOIUrl":"https://doi.org/10.1109/ICFN.2010.34","url":null,"abstract":"Among various tracking algorithms, particle filtering (PF) is a robust and accurate one for different applications. It also allows data fusion from different sources due to its inherent property without increasing the dimension of the state vector. In this paper, we propose three strategies to improve the performance of particle filters. First, our approach combines the foreground region with the particle initialization and similarity measure step to lower the background distraction. Second, we form the proposal distribution for particle filters from the dynamic model predicted from the previous time step. The combination of the two approach leads to fewer failure than traditional particle filters. Fusion of multiple cues including the spatial-color cues and edge cues is also used to improve the estimation performance. It is shown that with the improved proposal distribution above, the particle filter can provide greatly improved estimation accuracy and robustness for complicated tracking problems.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130783069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Power Control for Cognitive Relay Networks over Fading Channels","authors":"Wenjing Yue, B. Zheng, Qing-min Meng","doi":"10.1109/ICFN.2010.57","DOIUrl":"https://doi.org/10.1109/ICFN.2010.57","url":null,"abstract":"In this paper, we study the outage performance of proposed cognitive relay network which is defined by a source, a destination and a group of clusters each of which consists of a cognitive relay node and a primary node. In suggested model, a source is assisted by cognitive relay nodes which allow coexisting with primary nodes by imposing severe constraints on the transmission power so that they operate below the noise floor of primary nodes. Here, we mainly focus on understanding that the cognitive relay node impacts on the outage performance of proposed system model for Rayleigh fading channels under interference power constraints. A relay transmission scheme, namely, regenerative decode-and-forward (RDF) is considered. Considering a scenario with two relays, we derive the optimal power control policies of the cognitive relay nodes to achieve the minimum outage probability under both the peak and average interference power constraints over Rayleigh fading channels. Finally, the numerical results are presented to validate our theoretical results. Numerical performance results show that outage probability performance improves with the increase of the average interference power constraint and peak interference power constraint, and the power control policy under the average interference power constraint is more effective than that under the peak interference power constraint.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130999377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}