2016 2nd IEEE International Conference on Computer and Communications (ICCC)最新文献

筛选
英文 中文
Low-latency multimedia streaming using Open Networking Environments 使用开放网络环境的低延迟多媒体流
2016 2nd IEEE International Conference on Computer and Communications (ICCC) Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7925069
Andreas Schmidt, T. Lange, T. Herfet
{"title":"Low-latency multimedia streaming using Open Networking Environments","authors":"Andreas Schmidt, T. Lange, T. Herfet","doi":"10.1109/COMPCOMM.2016.7925069","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925069","url":null,"abstract":"Traditional services like video broadcast and telephony are more and more implemented on general-purpose networks. This is usually the Internet, which has different properties compared to special-purpose infrastructures as the public switched telephone network. This paper highlights three major causes why this migration is currently providing user experiences that are worse than with traditional networks. In particular, challenges caused by changed latency characteristics are addressed. For every cause, approaches are highlighted to tackle them, including novel transport protocols as well as paradigms to optimize transmissions at the network core. A presentation of new network infrastructures following the concept of Software-Defined Networking (SDN) completes the picture and allows to implement flow-oriented forwarding. Finally, the Open Networking Testbed operated by the Telecommunications Chair at Saarland University is presented, including its means to evaluate novel protocols, paradigms, and concepts in a controlled and realistic environment. Having international partners in place, it is possible to test new approaches on a global scale.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"353 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122793657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A fast carrier acquisition architecture for high-dynamic weak signal based on GPU 基于GPU的高动态弱信号快速载波采集架构
2016 2nd IEEE International Conference on Computer and Communications (ICCC) Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7925033
Yue Guo, Rongke Liu, Yi Hou, Ling Zhao
{"title":"A fast carrier acquisition architecture for high-dynamic weak signal based on GPU","authors":"Yue Guo, Rongke Liu, Yi Hou, Ling Zhao","doi":"10.1109/COMPCOMM.2016.7925033","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925033","url":null,"abstract":"In this paper, we present a graphics processing unit (GPU)-based architecture of carrier acquisition for high-dynamic weak signal in deep space communications. To achieve high performance, the carrier acquisition procedure is parallelized by exploiting the GPU's parallel operating characteristics. Based on computer unified device architecture (CUDA), different kernels are designed to map the different phases of carrier acquisition procedure. What's more, the kernels' efficiency are improved by optimizing the internal operation parallelism of kernels and lowering the memory access latency for threads. Besides, multiple CUDA streams are designed to hide the data transfer latency between host and device. Experimental results demonstrate that the proposed GPU-based architecture achieves more than 250.3 times speedup compared to CPU-based platform.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131739554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The subsequent transmission system of collaborative receiving terminal that based on fountain codes 基于喷泉码的协同接收终端后续传输系统
2016 2nd IEEE International Conference on Computer and Communications (ICCC) Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7925184
Wan Peng, Wang Feifei, Wang Jian
{"title":"The subsequent transmission system of collaborative receiving terminal that based on fountain codes","authors":"Wan Peng, Wang Feifei, Wang Jian","doi":"10.1109/COMPCOMM.2016.7925184","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925184","url":null,"abstract":"Since the sixth information revolution, people have entered the era of multimedia information. The transmission of information is no longer in a single way, people's demand for information exchange is more diversified, and the transmission of information environment is also more changeable. Then the collaborative receiving terminal based on fountain codes algorithm can meet all kinds of complex conditions in the current environment to achieve the transmitting and receiving of multimedia. The main work of this paper is a series of analysis and design of the subsequent transmission system of this terminal and to achieve the ultimate function by using the transfer mode that support TCP and UDP protocol.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121780476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis on the security of MIB objects defined in network device 分析网络设备中定义的MIB对象的安全性
2016 2nd IEEE International Conference on Computer and Communications (ICCC) Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924868
Haiyan Liu, Yifei Huo
{"title":"Analysis on the security of MIB objects defined in network device","authors":"Haiyan Liu, Yifei Huo","doi":"10.1109/COMPCOMM.2016.7924868","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924868","url":null,"abstract":"SNMP is currently the most widely used network management protocol which can examine the condition of network equipment and control them through visits MIB objects. It makes the network more convenient to manage while brings about new security challenges. Based on the analysis of the security threats brought by SNMP and the ways to attack a network through SNMP protocol, this paper designs several ways to analyze the security of MIB objects defined in a network device. At last it puts forward some corresponding security enhancement measures for management of SNMP, such as password setting, function selecting, software updating and proper SNMP configuring, etc. This article can be the reference of enhancing the security of the network managed by SNMP protocol.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127576762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An RSSI-based localization method with outlier suppress for wireless sensor networks 基于rssi的无线传感器网络离群值抑制定位方法
2016 2nd IEEE International Conference on Computer and Communications (ICCC) Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7925097
Yan Ge, Zhi Zheng, Bo Yan, Jiao Yang, Yuxuan Yang, Huipeng Meng
{"title":"An RSSI-based localization method with outlier suppress for wireless sensor networks","authors":"Yan Ge, Zhi Zheng, Bo Yan, Jiao Yang, Yuxuan Yang, Huipeng Meng","doi":"10.1109/COMPCOMM.2016.7925097","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925097","url":null,"abstract":"A novel least square (LS) localization method for wireless sensor networks (WSNs) using received signal strength indicator (RSSI) is proposed in this paper. Unlike previous LS methods, the proposed method performs location calculation with the aid of the condition number of coordinate matrix to avoid the appearance of outliers. The threshold of condition number is introduced in this paper to avoid outliers while enhance the localization accuracy. Simulation results demonstrate that our approach can suppress outliers more efficiently, and improve the accuracy and stability of localization.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133326296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
EEG evidence for human mirror activity during observation of ambiguous shadow actions: Toward an analysis of humanoid robotic system 在观察模糊阴影动作时人类镜像活动的脑电图证据:对仿人机器人系统的分析
2016 2nd IEEE International Conference on Computer and Communications (ICCC) Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924794
Huaping Zhu, Yaoru Sun
{"title":"EEG evidence for human mirror activity during observation of ambiguous shadow actions: Toward an analysis of humanoid robotic system","authors":"Huaping Zhu, Yaoru Sun","doi":"10.1109/COMPCOMM.2016.7924794","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924794","url":null,"abstract":"In this study, we investigated whether mere observation of ambiguous shadow motions with an anamorphic shape of a real hand would induce the human mirror neuron system (hMNS) activity and which aspects of the observed motion (i.e. the biologic property and the kinematical characteristic) are crucial to the hMNS activity. As an index of hMNS activity, EEG mu rhythm (8–13Hz) suppression at C3, Cz and C4 electrodes was examined during observation of ambiguous shadow motions with pre- and post-familiarisation compared to a flat geometrical shape movement (Baseline). The experimental results showed that no hMNS activity was found in pre-familiarisation condition even the anamorphic shadow was perceived as human hand. While, the hMNS activity was apparently found after a familiarisation process involves learning the kinematics features of the anamorphic shadow. Results reported here suggest that both biologic property and the kinematics features are crucial to the hMNS activity. The findings also may provide a new idea for the development of humanoid robotic system by modeling the human motion as two attribute set: biologic properties and kinematics primaries.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133405054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A survey on visual tracking via convolutional neural networks 基于卷积神经网络的视觉跟踪研究进展
2016 2nd IEEE International Conference on Computer and Communications (ICCC) Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924746
Jia Zhang, Lei Yang, Xiaoyu Wu
{"title":"A survey on visual tracking via convolutional neural networks","authors":"Jia Zhang, Lei Yang, Xiaoyu Wu","doi":"10.1109/COMPCOMM.2016.7924746","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924746","url":null,"abstract":"The paper summarized 13 classic methods of visual tracking and 9 methods combined with convolutional neural networks including some latest trackers and compared all these trackers in the same benchmark. After analyzing the results, we had some new idea for existing trackers.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133417959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research on algorithm of audio level compressor 音频级压缩算法研究
2016 2nd IEEE International Conference on Computer and Communications (ICCC) Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7925043
Sun Yuhang, L. Shanshan
{"title":"Research on algorithm of audio level compressor","authors":"Sun Yuhang, L. Shanshan","doi":"10.1109/COMPCOMM.2016.7925043","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925043","url":null,"abstract":"A audio compressor is an important part of a audio processing system. The compression algorithm designed in this paper will be applied to audio compressor in the digital audio broadcasting transmitter. In this paper, an effective algorithm for dynamic control of the gain by taking mean square value is proposed, and two different audio signal from two channel processing schemes will be compared to get better one on the impact of compression. Then the algorithm is evaluated by the effect of compression of signal amplitude in the MATLAB simulation, and a scheme selected that signal is firstly dealt with to enhance the effect of the dual channel stereo and then is compressed is more suitable for the two channel audio compression from two schemes.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133621625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An optimal on-line strategy for walking in streets with minimal sensing 基于最小感知的街道行走在线优化策略
2016 2nd IEEE International Conference on Computer and Communications (ICCC) Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924833
Qi Wei, X. Tan
{"title":"An optimal on-line strategy for walking in streets with minimal sensing","authors":"Qi Wei, X. Tan","doi":"10.1109/COMPCOMM.2016.7924833","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924833","url":null,"abstract":"This paper considers the problem of walking in the street with a mobile robot. The robot starts from a point s to search the target point t. The robot is equipped with a minimal sensing sensor that can only detect the discontinuities in depth information (or gaps), but has no prior knowledge of the street. The performance of our strategy is measured in terms of the competitive ratio, with respect to the length of the optimal path for walking in the street with complete knowledge. We propose a new 9-competitive strategy, and prove that it is optimal by showing a matching lower bound, whereas the previous best approach proposed by Tabatabaei et al. has a competitive ratio of 11.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132215447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Gaussian Mixture Model based prediction method of movie rating 基于高斯混合模型的电影评级预测方法
2016 2nd IEEE International Conference on Computer and Communications (ICCC) Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7925073
Jia-xing Zhu, Yijun Guo, Jianjun Hao, Jianfeng Li, Duo Chen
{"title":"Gaussian Mixture Model based prediction method of movie rating","authors":"Jia-xing Zhu, Yijun Guo, Jianjun Hao, Jianfeng Li, Duo Chen","doi":"10.1109/COMPCOMM.2016.7925073","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925073","url":null,"abstract":"Nowadays, with the increasing usage of the internet, the movie ratings on the SNS website related to movies influence our choice of movies remarkably. However, a newly released film has insufficient rating counts to reflect the quality of the movie, and it can not avoid the influence of malicious rating by some people. Therefore, this paper proposes a method of rating prediction based on Gaussian Mixture Model (GMM), enabled by imitating rating behavior of audience. Meanwhile, this model can avoid the influence of malicious rating because GMM is not sensitive to exception. In GMM, 4 features of the movies are taken into consideration. In order to verify the validity of our model, data from Douban website is used in the implementation. Experimental results exhibit the effectiveness of the method and an improved performance of rating prediction is achieved compared with the benchmark of linear regression.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134417774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信