20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)最新文献

筛选
英文 中文
A New Approach for Locating Mobile Stations under the Statistical Directional Propagation Model 基于统计方向传播模型的移动台定位新方法
K. Chu, J. Ng, Karl R. P. H. Leung
{"title":"A New Approach for Locating Mobile Stations under the Statistical Directional Propagation Model","authors":"K. Chu, J. Ng, Karl R. P. H. Leung","doi":"10.1109/AINA.2006.40","DOIUrl":"https://doi.org/10.1109/AINA.2006.40","url":null,"abstract":"Recently, mobile location estimation is drawing considerable attention in the field of wireless communications. Among different mobile location estimation methods, the one which estimates the location of mobile stations with reference to the wave propagation model is drawing much attention on the grounds that it is applicable to different kinds of cellular network. However the estimation accuracy of the signal propagation model deteriorates as the distance between the mobile station and the receiving base station increases. In view of this, we have designed a new location estimation approach which has divided the location estimation into two phases, the data collection phase and the location estimation phase. In this paper, we report our study of the new location estimation approach. We tested the approach with real life data collected from a major mobile operator of Hong Kong. Results show that the new location estimation approach has improved the existing statistical signal propagation model by 30.94%. This improvement can be further enhanced if more data are collected","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"77 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122081758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Component integrity check and recovery against malicious codes 组件完整性检查和恢复针对恶意代码
Joon S. Park, Gautam Jayaprakash, J. Giordano
{"title":"Component integrity check and recovery against malicious codes","authors":"Joon S. Park, Gautam Jayaprakash, J. Giordano","doi":"10.1109/AINA.2006.131","DOIUrl":"https://doi.org/10.1109/AINA.2006.131","url":null,"abstract":"With the rise in usage of software components in distributed computing applications, the importance of safeguarding these components has assumed great significance. In trying to ensure the survivability of these components, we enable a mission-critical application to detect malicious codes in a component downloaded from a remote location and recover the original functionality of the compromised component. In our work, we use digital signatures to ensure the integrity of software components in a large distributed system. By detecting unauthorized add-ons to the original components we can ensure that only legitimate software components are allowed to execute in a protected software environment. We also explore techniques to recover the original functionality of the component under attack by removing the affected portion from the component. In this paper we introduce the system architecture and the support mechanisms for our proposed approaches","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116854889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A fault-tolerant model for wireless sensor-actor system 无线传感器-角色系统的容错模型
Keiji Ozaki, Kenichi Watanabe, Satoshi Itaya, Naohiro Hayashibara, T. Enokido, M. Takizawa
{"title":"A fault-tolerant model for wireless sensor-actor system","authors":"Keiji Ozaki, Kenichi Watanabe, Satoshi Itaya, Naohiro Hayashibara, T. Enokido, M. Takizawa","doi":"10.1109/AINA.2006.24","DOIUrl":"https://doi.org/10.1109/AINA.2006.24","url":null,"abstract":"In a wireless sensor and actor network (WSAN), a group of sensors and actors are geographically distributed and linked by wireless networks. Sensors gather information sensed for an event in the physical world and send them to actors. Actors perform appropriate actions on actuation devices by making a decision on receipt of sensed information from sensors. Sensors are low cost, low powered devices with limited energy, computation, and wireless communication capabilities. Sensors may not only stop by fault but also suffer from arbitrary faults. Furthermore, wireless communication is less reliable due to noise and shortage of power of sensors. Reliable real time communication among sensors, actors, and actuation devices, is required in WSAN applications. We newly propose a multi-actor/multi-sensor (MAMS) model. In addition, multiple actors may perform actions on receipt of sensed information. Multiple redundant execution of an action on each device has to be prevented and conflicting actions on each device from multiple actors have to be serialized. In this paper, we discuss how to make WSAN reliable and available and how to reliably and non-redundantly perform actions with realtime constraints.","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128361442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
An intrusion detection system using alteration of data 一种利用数据改变的入侵检测系统
F. Nagano, K. Tatara, K. Sakurai, T. Tabata
{"title":"An intrusion detection system using alteration of data","authors":"F. Nagano, K. Tatara, K. Sakurai, T. Tabata","doi":"10.1109/AINA.2006.94","DOIUrl":"https://doi.org/10.1109/AINA.2006.94","url":null,"abstract":"Attacks against data in memory are one of the most serious threats these days. Although many detection systems have been proposed so far, most of them can detect only part of alteration. Some detection systems use canaries to detect alteration. However, if an execution code has bugs that enable attackers to read data in memory, the system could be bypassed by attackers who can guess canaries. To overcome the problems, we propose a system using alteration of data. Our proposed system detects illegal alteration with verifier for vulnerable data. Verifier is made before vulnerable data could be altered by attackers, and verifier is checked when the program uses the vulnerable data. Part of verifier is stored in kernel area to prevent attackers from reading data in user memory. Our approach can detect illegal alteration of arbitrary data in user memory. Our proposed system, moreover, does not have the problem systems using canaries have.","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128412745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Lysa, a distributed collaborative multiple users interface for exploring genomics databases Lysa,一个用于探索基因组数据库的分布式协作多用户界面
Pierre-Emmanuel Gros, N. Férey, J. Hérisson, R. Gherbi
{"title":"Lysa, a distributed collaborative multiple users interface for exploring genomics databases","authors":"Pierre-Emmanuel Gros, N. Férey, J. Hérisson, R. Gherbi","doi":"10.1109/AINA.2006.211","DOIUrl":"https://doi.org/10.1109/AINA.2006.211","url":null,"abstract":"Many databases and software tools are available for biologists in order to have access to genomic information. In a SQL manner, our information system GenoMEDIA addresses the problem of integrating heterogeneous data-bases and software utilities within a generic distributed platform. Lysa increases the GenoMEDIA SQL interface by adding an interactive collaborative graphical environment. Upon a usual query on biological database, gigabytes of data could be returned to the users. The aim of Lysa, through the databall concept, a certain kind of data introspection and collaborative engine, is to allow groups of users to make semantic links in these huge amounts of data. The main point of this paper is the collaborative framework written for Lysa. This framework allows multiple users to work upon the same shared biological data. This was written in order to add the capabilities and the knowledge of multiple users in order to extract information of the huge mass of data coming from biological databases.","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129663621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Packet Scheduler For Wireless Ad Hoc Networks With Switched Beam Antennas 具有交换波束天线的无线自组织网络的高效分组调度
G. Grimaud, A. Honore, Hervé Meunier, D. Simplot-Ryl
{"title":"Efficient Packet Scheduler For Wireless Ad Hoc Networks With Switched Beam Antennas","authors":"G. Grimaud, A. Honore, Hervé Meunier, D. Simplot-Ryl","doi":"10.1109/AINA.2006.166","DOIUrl":"https://doi.org/10.1109/AINA.2006.166","url":null,"abstract":"Using beam forming antennas and ULB modulations in ad hoc networks have been recently focused on, as they allow to drastically improve ad-hoc network performances. This new technological context implies revisiting common network algorithms. When considering an multi-sector antenna uncommon with an uncommon high switch delay, packets have to be efficiently scheduled on beams at the MAC layer level, in order to improve the network capacity. We consider two optimization criteria: the network throughput and the maximum delay of packets. This paper proposes and studies a MAC scheduler, FIFO TBW, efficiently reducing the overhead due to beam switching delays. We give a first approach to estimate the window duration parameter","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127373115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Analysis of iSCSI Middleware Optimized for Encryption Processing in a Long-Latency Environment 长时延环境下优化加密处理的iSCSI中间件性能分析
K. Kamisaka, Saneyasu Yamaguchi, M. Oguchi
{"title":"Performance Analysis of iSCSI Middleware Optimized for Encryption Processing in a Long-Latency Environment","authors":"K. Kamisaka, Saneyasu Yamaguchi, M. Oguchi","doi":"10.1109/AINA.2006.265","DOIUrl":"https://doi.org/10.1109/AINA.2006.265","url":null,"abstract":"Since IP-SAN allows us to reduce initial costs and management costs of storage by using IP networks, iSCSI, common protocol in IP-SAN, is becoming more important. Although one of the key issues for iSCSI is a security measure to access remote storage over IP networks, this is not necessarily established yet. iSCSI can employ IPsec that offers a function of strong encryption. However, the IPsec encryption processing degrades throughput of storage access and increases its CPU load. In addition, it is difficult to execute encryption processing efficiently, because IPsec layer is located in a lower-level. In this paper, we implemented a middleware system of executing encryption processing in the upper-layer for the communication using iSCSI securely and effectively. Moreover, we simulated the idea of optimization of encryption processing and evaluated its performance by running parallel processes in a long-latency network. As a result, optimization method of encryption processing is more efficient than that of IPsec in a long-latency network","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127150774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Novel WPDM System Based on Channel Equalization for Multipath Fading Channels 基于多径衰落信道均衡的新型WPDM系统
Lei Zhou, Jiandong Li, P. He
{"title":"Novel WPDM System Based on Channel Equalization for Multipath Fading Channels","authors":"Lei Zhou, Jiandong Li, P. He","doi":"10.1109/AINA.2006.240","DOIUrl":"https://doi.org/10.1109/AINA.2006.240","url":null,"abstract":"A novel wavelet packet division multiplexing (WPDM) system based on channel equalization is studied for multipath fading channels. The principle of WPDM is presented in this paper. New WPDM structures based on channel equalization and Htilde matrix based on ZF (zero forcing) algorithm are the two novel aspects of this system. The performance of the system under the multipath fading channels is analyzed","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129984437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
EC: an edge-based architecture against DDoS attacks and malware spread EC:针对DDoS攻击和恶意软件传播的基于边缘的架构
R. Karrer
{"title":"EC: an edge-based architecture against DDoS attacks and malware spread","authors":"R. Karrer","doi":"10.1109/AINA.2006.159","DOIUrl":"https://doi.org/10.1109/AINA.2006.159","url":null,"abstract":"The ability to limit unsolicited traffic in the Internet is important to defy DDoS attacks and to contain the spread of worms and viruses. The concept of capabilities, which requires that sources must acquire tokens prior to sending data, has been successfully applied on an end-to-end base to protect end systems. In this paper, we propose edge-based capabilities (EC), an architecture that prevents DDoS attacks and malware spread at the edge. EC introduces a novel network element termed gate. The gate controls IP packets that have previously been authenticated by an end-to-end mechanism. Authenticated traffic carries a session-specific tag in the IP header. Packets with valid tags are forwarded by the gate whereas traffic without or with wrong tags is treated with low priority or even dropped. EC achieves efficiency and scalability by defining a single lock against which tags are compared, removing the need to store per-flow information in the gate. Compared to related proposals, EC is easy to deploy as the gate can be added incrementally and EC requires only a single network element to be added at the edge","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130550549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Resources availability for peer to peer systems 对等系统的资源可用性
Georges Da Costa, C. Marchand, Olivier Richard, J. Vincent
{"title":"Resources availability for peer to peer systems","authors":"Georges Da Costa, C. Marchand, Olivier Richard, J. Vincent","doi":"10.1109/AINA.2006.288","DOIUrl":"https://doi.org/10.1109/AINA.2006.288","url":null,"abstract":"Nowadays, peer to peer systems are largely studied. But in order to evaluate them in a realistic way, a better knowledge of their environments is needed. In this article we focus on the computers availability in these systems. We characterize this availability behind ADSL lines and we link it with the availability of peer to peer systems participants. We emphasise on the methodology as generalized in other systems such as grids or ad-hoc systems. We finally show how users of ADSL lines are related to peer to peer users and we give some examples of the possible practical use of theses results. The results are based on trace datasets obtained over the first five month of 2003 with around 5000 hosts.","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132259277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信