2013 19th IEEE International Conference on Networks (ICON)最新文献

筛选
英文 中文
Generalized fairness in QoS scheduling QoS调度中的广义公平性
2013 19th IEEE International Conference on Networks (ICON) Pub Date : 1900-01-01 DOI: 10.1109/ICON.2013.6781972
J. Cobb
{"title":"Generalized fairness in QoS scheduling","authors":"J. Cobb","doi":"10.1109/ICON.2013.6781972","DOIUrl":"https://doi.org/10.1109/ICON.2013.6781972","url":null,"abstract":"Many scheduling protocols have been developed that provide both rate and fairness guarantees. That is, flows can take advantage of unused capacity without incurring any penalty at the scheduler. The manner in which unused capacity is distributed among the active flows varies significantly between protocols. Some are partial to flows that have a larger reserved rate, while others are partial to flows with a lesser reserved rate. We present a generalization of all of these behaviors under a single common framework, which we refer to as generalized fairness. We present a scheduling protocol that provides generalized fairness, and we prove upper bounds on the exit times of packets from the scheduler. These bounds apply to earlier protocols as well, since they are specific instances of the general framework. In addition, the protocol also supports flows that transmit at a fixed rate but have tight delay requirements.","PeriodicalId":219583,"journal":{"name":"2013 19th IEEE International Conference on Networks (ICON)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121446651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DCF and EDCA throughput improvement using Selective Anomalous Slot Avoidance (SASA) 利用选择性异常槽避免(SASA)提高DCF和EDCA吞吐量
2013 19th IEEE International Conference on Networks (ICON) Pub Date : 1900-01-01 DOI: 10.1109/ICON.2013.6781982
Teuku Yuliar Arif, R. F. Sari
{"title":"DCF and EDCA throughput improvement using Selective Anomalous Slot Avoidance (SASA)","authors":"Teuku Yuliar Arif, R. F. Sari","doi":"10.1109/ICON.2013.6781982","DOIUrl":"https://doi.org/10.1109/ICON.2013.6781982","url":null,"abstract":"In DCF and EDCA schemes, the number of collisions increased caused the number of anomalous slots also increased. These conditions caused the average duration of collision will be much longer and result in a decreased network throughput. In this paper we have proposed SASA scheme to avoid anomalous slot after the collision. Simulation results show SASA scheme produces higher throughput compare to DCF and EDCA schemes.","PeriodicalId":219583,"journal":{"name":"2013 19th IEEE International Conference on Networks (ICON)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114987634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security testing in Android networks - A practical case study Android网络中的安全测试——一个实际案例研究
2013 19th IEEE International Conference on Networks (ICON) Pub Date : 1900-01-01 DOI: 10.1109/ICON.2013.6781950
R. Hunt
{"title":"Security testing in Android networks - A practical case study","authors":"R. Hunt","doi":"10.1109/ICON.2013.6781950","DOIUrl":"https://doi.org/10.1109/ICON.2013.6781950","url":null,"abstract":"Android is a new generation of an open operating system directed at mobile devices that are carried every day. The openness of this architecture is leading to new applications and opportunities including a host of multimedia services, new interfaces and browsers, multitasking including support for wireless local, personal and wide area networking services. Security with mobility and wireless connectivity thus becomes even more important with all these exciting developments. Vital security issues such as leakage of private information, file stealing and spambots abound in networks in practice and Android networks continue to be subject to these same families of vulnerabilities. This paper provides a demonstration of such vulnerabilities in spite of the best efforts of designers and implementers. In particular it describes examples of data leakage and file stealing (address books, contact lists, SMS messages, pictures) as well as demonstrating how Android devices can create spambots.","PeriodicalId":219583,"journal":{"name":"2013 19th IEEE International Conference on Networks (ICON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128063490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信