2006 International Conference on Systems and Networks Communications (ICSNC'06)最新文献

筛选
英文 中文
Components for a pervasive information dissemination architecture 用于普及信息传播体系结构的组件
Jan Moons, C. D. Backer, H. Mannaert
{"title":"Components for a pervasive information dissemination architecture","authors":"Jan Moons, C. D. Backer, H. Mannaert","doi":"10.1109/ICSNC.2006.28","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.28","url":null,"abstract":"In this paper we explore the requirements of pervasive information dissemination architectures. We identify five critical components that should be present in such a system - the real-virtual bridge, the data representation component, the information presentation component, the security component and the middleware - and provide an overview of the various implementation options. We also present our current proof-ofconcept system including the choices we have made with regard to the five components. Using cheap RFID tags and readers, stock PDA¿s and an ontology-based back-end, this proof-of-concept implementation represents a low-cost and realistic pervasive campus information system. The goal of this paper is to spark discussion as to the suitability of this architecture as a pervasive education environment.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115517439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Privacy-Invasive Software and Preventive Mechanisms 侵犯隐私的软件和预防机制
Martin Boldt, B. Carlsson
{"title":"Privacy-Invasive Software and Preventive Mechanisms","authors":"Martin Boldt, B. Carlsson","doi":"10.1109/ICSNC.2006.62","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.62","url":null,"abstract":"Computers are increasingly more integrated into peoples¿ daily lives. In this development, user privacy is affected by the occurrence of privacy-invasive software (PIS), sometimes loosely labelled as spyware. The border between legitimate software and PIS is vague and context dependent, at best specified through End-User License Agreements (EULA). This lack of spyware definition result in that current countermeasures are bound to noticeable misclassification rates. In this work we present a classification of PIS from which we come to the conclusion that additional mechanisms that safeguard users¿ consent during software installation is needed, to effectively counteract PIS. We further present techniques that counteract PIS by increasing user awareness about software behaviour, which allow users to base their software installation consent on more informed decisions.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121613967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Experimental Performance Evaluation of Mobile IPv6 Handovers over Wireless LAN 无线局域网上移动IPv6切换的实验性能评价
Jong‐Hyouk Lee, Tai-Myung Chung
{"title":"Experimental Performance Evaluation of Mobile IPv6 Handovers over Wireless LAN","authors":"Jong‐Hyouk Lee, Tai-Myung Chung","doi":"10.1109/ICSNC.2006.38","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.38","url":null,"abstract":"Over the past several years there has been increasing the number of mobile devices. Mobile IPv6 enables mobile devices to communicate with each other while moving and has been implemented by several organizations. Though Mobile IPv6 implementations has been confirmed, the performance evaluation is one of the important next step to expect deployment in real environments. In this paper, we present experimental results on the performance of Mobile IPv6 handovers with the test parameters such as RTT, TCP and UDP throughput.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124079302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Topological Hole Detection in Sensor Networks with Cooperative Neighbors 具有合作邻居的传感器网络拓扑空洞检测
Kun Bi, Kun Tu, Naijie Gu, Wanli Dong, Xiaohu Liu
{"title":"Topological Hole Detection in Sensor Networks with Cooperative Neighbors","authors":"Kun Bi, Kun Tu, Naijie Gu, Wanli Dong, Xiaohu Liu","doi":"10.1109/ICSNC.2006.71","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.71","url":null,"abstract":"In a wireless sensor network, the regions in which a large percentage of sensor nodes are not available may form holes in the network. In holes, sensor nodes may be depleted or not dense enough to communicate with others. So those holes may degrade some applications¿ performances in sensor networks. In this paper, we study the problem of detecting topological holes in sensor networks with no localization information in any node. We present a distributed cooperative scheme which is only based on the communication topology graph. To identify holes, each node only needs to exchange information with its 1-hop and 2-hop neighbors. With the cooperation of its 2-hop neighbors, each node could independently decide whether it is on the boundary of a hole. Experimental results demonstrate that our algorithm could indeed capture the characteristics of those boundary nodes and describe those holes in sensor networks of moderate node densities.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117183270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
XHTML encoding and compression XHTML编码和压缩
S. Manoharan
{"title":"XHTML encoding and compression","authors":"S. Manoharan","doi":"10.1109/ICSNC.2006.78","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.78","url":null,"abstract":"The wireless application environment uses the wireless markup language (WML) as the primary markup language. WML is based on XML and therefore is quite verbose. Mobile networks generally have low bandwidth and high latency, and verbose documents can therefore take a long time to transfer. Further, mobile devices, especially older ones, do not typically have the processing power or memory to process such verbosity. Since all WML documents have to go through a mobile gateway, WAP 1.x specifies that the WML files are encoded to make them smaller. This lowers the transfer times and simplifies processing on the mobile device. WAP 2.0 includes support for a restricted version of XHTML, called the XHTML mobile profile. This is to make content development and management easier. XHTML, though as verbose as WML, is never encoded by the gateway. This is mainly because WAP 2.0 does not require the use of a gateway. Besides, the advances in mobile processing power and mobile networks mitigate some of the issues arising from the verbosity of XML. This paper investigates what performance gains are possible if XHTML were encoded and compressed. The experiments show that while there is a substantial performance gain using compression, gains due to encoding are comparatively small. The empirical results justify that XHTML encoding is not generally useful.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123130066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Active Service Quality Management in ASEMA system ASEMA系统中的主动服务质量管理
M. Sihvonen, M. Nieminen, J. Oikarinen, Tomi D. Räty
{"title":"Active Service Quality Management in ASEMA system","authors":"M. Sihvonen, M. Nieminen, J. Oikarinen, Tomi D. Räty","doi":"10.1109/ICSNC.2006.18","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.18","url":null,"abstract":"One of the purposes of the Active Service Environment Management system (ASEMA) is to provide the best possible multimedia service experience to end users. This is realized by dynamically adapting to changes in service environment¿s configuration and used network infrastructure¿s quality of service (QoS) changes. The research problem of the paper is to find a solution for proactive approach to manage multimedia service performance in a dynamic service environment. The research is based on the constructive method by analyzing the related publications and experimentation with the selected technologies by implementing the solutions part of the ASEMA prototype. The prototype has profile negotiation functionality that dynamically updates ASEMA profiles according to dynamic changes in an end user¿s service environment. The quality of service management functionality in ASEMA monitor¿s actively underlying network¿s QoS level. It adjusts quality of video stream according to the changes in QoS levels of the used network infrastructure.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"139 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128868072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ASASI: An Environment for Addressing Software Application Security Issues ASASI:解决软件应用程序安全问题的环境
Mehrez Essafi, L. L. Jilani, H. Ghézala
{"title":"ASASI: An Environment for Addressing Software Application Security Issues","authors":"Mehrez Essafi, L. L. Jilani, H. Ghézala","doi":"10.1109/ICSNC.2006.23","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.23","url":null,"abstract":"Security is an emergent property of a software system. Several efforts are undertaken, to improve software security. However, developers still miss or misuse acquired knowledge. This is mainly due to domain immaturity, newness of the field, process complexity and absence of environments supporting such development. This paper presents our environment denoted ASASI for Addressing Software Application Security Issues. The main feature of the proposed environment is that it is based on a strategy oriented process model that provides a two level guidance. The first level guidance is strategic helping developers choosing one among compilations of the existing methods, standards and best practices. The second level guidance is tactical helping developers achieving their selection for producing secure software. The supported process model is easily extensible and allows building customized processes adapted to context, developer¿s finalities and product state. This flexibility allows the environment evolving through time to support new security requirements. Keywords-environment;","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125316730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Bargaining Based Dynamic Spectrum Management Scheme in Reconfigurable Systems 可重构系统中一种新的基于议价的动态频谱管理方案
M. Pan, Shuo Liang, Haozhi Xiong, Jie Chen, Guanlin Li
{"title":"A Novel Bargaining Based Dynamic Spectrum Management Scheme in Reconfigurable Systems","authors":"M. Pan, Shuo Liang, Haozhi Xiong, Jie Chen, Guanlin Li","doi":"10.1109/ICSNC.2006.10","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.10","url":null,"abstract":"B3G wireless networks are expected to be characterized by the pouring of diversified services supported by different operators. In parallel with this, how to efficiently utilize the limited radio spectrum and guarantee the operator¿s profits has become a joint economical and technical problem. As a possible solution, in this paper, we set forth a novel bargaining approach for dynamic spectrum management (DSM) based on alternating-offer bargaining games in microeconomics. In the context of distributed reconfigurable networks in the charge of different operators, bargaining based dynamic spectrum management (BDSM) scheme introduces trading agent (TA), changing bargaining ability as well as revenue-sharing mechanism to facilitate the spectrum trading. Related technologies, bargaining games and proposed algorithm are also described in details. Simulation results show that with imperfect load predicting, BDSM is effective in improving the utilization of spectrum, expanding the individual operator¿s profits and enhancing the fairness among different RANs (radio access networks).","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127951195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Cost Benefit Study of Sparse-PartialWavelength Conversion Architectures 稀疏部分波长转换架构的成本效益研究
A. Soares, José Maranhão Neto, W. Giozza, Paulo R. F. Cunha
{"title":"Cost Benefit Study of Sparse-PartialWavelength Conversion Architectures","authors":"A. Soares, José Maranhão Neto, W. Giozza, Paulo R. F. Cunha","doi":"10.1109/ICSNC.2006.30","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.30","url":null,"abstract":"In this paper, we propose a new wavelength converter placement scheme called Adaptive First Load Priority, useful for designing and planning of optical networks with sparse-partial wavelength conversion architecture. The adaptive FLP is an extension of the FLP (First Load Priority) placement scheme proposed by authors in a previous work [13]. Initially, we provide a performance evaluation of FLP. Comparing to others wavelength converter placement schemes proposed in the literature like XC scheme [5], our results show that FLP achieves the best performance at all scenarios studied, very close to that one achieved with a full-complete wavelength conversion architecture. However, we could observe that, after a certain threshold, just adding moreWavelength Converter Routers (WCR) with the FLP scheme may not have enough improvement in network performance that justifies a higherWCR cost. The Adaptive First Load Priority scheme was conceived in order to minimize the amount of WCRs used by FLP scheme, improving its cost benefit. A cost-benefit (ratio gain) study showing a superior performance of Adaptive FLP scheme is presented.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133962759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the Applicability of Remote Rendering of Networked Virtual Environments on Mobile Devices 网络虚拟环境远程绘制在移动设备上的适用性研究
P. Quax, Bjorn Geuns, Tom Jehaes, W. Lamotte, Gert Vansichem
{"title":"On the Applicability of Remote Rendering of Networked Virtual Environments on Mobile Devices","authors":"P. Quax, Bjorn Geuns, Tom Jehaes, W. Lamotte, Gert Vansichem","doi":"10.1109/ICSNC.2006.57","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.57","url":null,"abstract":"The technologies behind Networked Virtual Environments have seen increased interest in recent years, mainly due to the proliferation of the Massively Multiplayer On Line games. It is of increasing importance to developers and service providers to be able to target the mass market of mobile device users. With increased availability of wireless connectivity, one of the hurdles has been stepped over. However, displaying a graphically attractive environment on a device with limited capabilities and battery power still presents a major obstacle. On the other hand, mobile television viewing is currently actively being promoted as one of the key drivers behind the market uptake of 3G services. By using a technique that is known as remote rendering, we are able to use existing client-side hardware (suited for 3G applications) for display of NVE-based applications on mobile devices. In this paper, we present an overview of a system architecture that supports remote rendering of these applications and measurement results that show the feasibility of the approach.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134575072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信