2017 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)最新文献

筛选
英文 中文
Understanding the feasibility of machine learning algorithms in a game theoretic environment for dynamic spectrum access 了解机器学习算法在博弈论环境下动态频谱访问的可行性
Alisha Thapaliya, S. Sengupta
{"title":"Understanding the feasibility of machine learning algorithms in a game theoretic environment for dynamic spectrum access","authors":"Alisha Thapaliya, S. Sengupta","doi":"10.23919/SPECTS.2017.8046784","DOIUrl":"https://doi.org/10.23919/SPECTS.2017.8046784","url":null,"abstract":"The key enabling technology in dynamic spectrum access is Cognitive Radio that allows unlicensed secondary users to access the licensed bands without causing any interference to the primary users. In any situation where there are a certain number of secondary networks trying to get an available channel, there arises a game theoretic competition where they want to get the channel for themselves by incurring as minimum cost as possible. The increase in cost is equivalent to the increase in time caused by the need of a search for an available channel. This process could be sped up if the networks had a predictive mechanism to determine the optimal strategy. In this paper, we investigate various predictive algorithms: Linear regression, Support Vector Regression and Elastic Net and compare them with other traditional non-predictive game theoretic mechanisms. We measure the accuracy of these algorithms in terms of time taken to reach the system convergence. We also observe how a self-learning approach can be helpful in maximizing utilities of the players in comparison to traditional game theoretic approaches.","PeriodicalId":224620,"journal":{"name":"2017 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130832964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improving video streaming over cellular networks with DASH-based device-to-device streaming 通过基于dash的设备到设备流改进蜂窝网络上的视频流
A. Al-Habashna, Gabriel A. Wainer, S. Fernandes
{"title":"Improving video streaming over cellular networks with DASH-based device-to-device streaming","authors":"A. Al-Habashna, Gabriel A. Wainer, S. Fernandes","doi":"10.23919/SPECTS.2017.8046768","DOIUrl":"https://doi.org/10.23919/SPECTS.2017.8046768","url":null,"abstract":"With the continuously increasing popularity of video streaming applications, providing video streaming services with high Quality of Experience (QoE) is becoming a main concern for cellular network operators. This paper presents and investigates the performance of an architecture for improving the QoE of video streaming in cellular networks. The architecture provides Dynamic Adaptive Streaming over HTTP (DASH) — based Peer-to-Peer (P2P) video streaming in cellular networks. The architecture employs Base-Station (BS) assisted Device-to-Device (D2D) video transmission in cellular networks for direct exchange of video contents among users. We evaluate the performance of the proposed architecture in terms of many video streaming QoE metrics. Furthermore, we investigate and provide a thorough analysis of the performance of the proposed architecture under various scenarios.","PeriodicalId":224620,"journal":{"name":"2017 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)","volume":"44 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132283645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Dimensional data model for early alerts of malicious activities in a CSIRT 用于CSIRT中恶意活动早期警报的维度数据模型
Paul Valladares, Walter Fuertes, Freddy Tapia, T. Toulkeridis, Ernesto Perez
{"title":"Dimensional data model for early alerts of malicious activities in a CSIRT","authors":"Paul Valladares, Walter Fuertes, Freddy Tapia, T. Toulkeridis, Ernesto Perez","doi":"10.23919/SPECTS.2017.8046771","DOIUrl":"https://doi.org/10.23919/SPECTS.2017.8046771","url":null,"abstract":"The growth and evolution of threats, vulnerabilities and cyber-attacks increase security incidents and generate negative impacts on organizations. We present an online analytical processing (OLAP) system for early alerts of upcoming malicious activities. This study aims to systematize the support of cybersecurity granted by a Computer Security Incident Response Team (CSIRT) and shall help to establish a mechanism to analyze and improve the overall level of security of networks and equipment by providing early warning services. In order to accomplish this task, a Business Intelligence solution has been developed adapting the methodology of Ralph Kimball to support the analysis of computer security incidents. This generates a data warehouse of information collected from alerts and events recorded from a continuous transmission of data from various Internet security sources that gather, trace and report malware, botnet, and electronic fraud. Furthermore, we constructed with Pentaho BI load data into the dimensions, measures and facts, OLAP cubes, reports and dashboards. The acquired results demonstrate the functionality of the application where it is possible to visualize with certainty of both, the early warnings, as well as the level of security of the participant Institutions, about the registered threats and vulnerabilities.","PeriodicalId":224620,"journal":{"name":"2017 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)","volume":"32 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114105312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A campus-level view of Netflix and Twitch: Characterization and performance implications Netflix和Twitch的校园级视图:特征和性能影响
Michel Laterman, M. Arlitt, C. Williamson
{"title":"A campus-level view of Netflix and Twitch: Characterization and performance implications","authors":"Michel Laterman, M. Arlitt, C. Williamson","doi":"10.23919/SPECTS.2017.8046774","DOIUrl":"https://doi.org/10.23919/SPECTS.2017.8046774","url":null,"abstract":"Video streaming is a major contributor to modern Internet traffic. In this paper, we use data collected from a campus edge network to characterize two popular video streaming services: Netflix and Twitch. While these video streaming services provide inherently different types of content, namely video-on-demand and live-streaming, they nonetheless exhibit many similarities in traffic patterns, protocol usage, content popularity, and growth. We identify seven similarities and differences, and discuss how these could be leveraged to improve streaming video content delivery on the Internet in the future.","PeriodicalId":224620,"journal":{"name":"2017 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114065100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Matrix resconstruction: Skeleton decomposition versus singular value decomposition 矩阵重构:骨架分解与奇异值分解
A. Sekmen, A. Aldroubi, A. Koku, Keaton Hamm
{"title":"Matrix resconstruction: Skeleton decomposition versus singular value decomposition","authors":"A. Sekmen, A. Aldroubi, A. Koku, Keaton Hamm","doi":"10.23919/SPECTS.2017.8046777","DOIUrl":"https://doi.org/10.23919/SPECTS.2017.8046777","url":null,"abstract":"In this work, Skeleton Decomposition (SD) and Singular Value Decomposition (SVD) are compared and evaluated for reconstruction of data matrices whose columns come from a union of subspaces. Specifically, an original data matrix is reconstructed from noise-contaminated version of it. First, matrix reconstruction using SD iteratively is introduced and alternative methods for forming SD-based reconstruction are discussed. Then, through exhaustive simulations, effects of process parameters such as noise level, data size, number of subspaces and their dimensions are evaluated for reconstruction performance. It is also shown that SD-based reconstruction is more effective when data is drawn from a union of low dimensional subspaces compared to a single space of the same dimension.","PeriodicalId":224620,"journal":{"name":"2017 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121855949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Privacy-preserving cybersecurity information exchange mechanism 保护隐私的网络安全信息交换机制
Iman Vakilinia, Deepak K. Tosh, S. Sengupta
{"title":"Privacy-preserving cybersecurity information exchange mechanism","authors":"Iman Vakilinia, Deepak K. Tosh, S. Sengupta","doi":"10.23919/SPECTS.2017.8046783","DOIUrl":"https://doi.org/10.23919/SPECTS.2017.8046783","url":null,"abstract":"Cybersecurity information sharing is improving cyber incident detection and prevention by reducing the loss caused by attacks and eliminating the costs of duplication efforts for cyber-defense. However, privacy is one of the major concerns of organizations, while they are gathering security information to share externally. In order to preserve the privacy of organizations in the cybersecurity information sharing framework, we propose a novel mechanism which consists of four components: (i) Registration, (ii) Sharing, (iii) Dispute, (iv) Rewarding. Our mechanism enables the organizations to share their cybersecurity information without revealing their identities. Besides, in order to encourage collaboration and prevent free-riding, rewards are issued anonymously in return for contributions. For this purpose, we are proposing a new aggregatable blind signature based on BBS+ signature scheme. Security analysis and performance evaluation are conducted showing the effectiveness and efficiency of the proposed mechanism.","PeriodicalId":224620,"journal":{"name":"2017 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114075291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
A simulator for UAVs management in agriculture domain 农业领域无人机管理模拟器
F. Rango, Nunzia Palmieri, A. Santamaria, Giuseppe Potrino
{"title":"A simulator for UAVs management in agriculture domain","authors":"F. Rango, Nunzia Palmieri, A. Santamaria, Giuseppe Potrino","doi":"10.23919/SPECTS.2017.8046780","DOIUrl":"https://doi.org/10.23919/SPECTS.2017.8046780","url":null,"abstract":"Drones or Unmanned Aerial Vehicles (UAVs) receive a growing interest for agricultural purposes. The aim is to provide inspiring insights in this domain from a technological and computational point of view. In these last years, indeed, there is an enormous potential that UAV technologies presents to support the agricultural domain in monitoring the land for checking and countering the presence of parasites that can damage the crop. However, to properly manage a UAVs team, equipped with multiple sensors and actuators, it is necessary to test these technologies and design proper strategies and coordination techniques able to efficiently manage the team. At this purpose, the paper proposes a simulator suitable for the agriculture domain in order to design novel coordination and control techniques of a UAVs team. Moreover it is possible to define the main variables and parameters of this domain of interest. The work presented many coordination techniques both for monitoring the area and both for coordinating the actions of the drones in the presence of parasites in order to analyze how the performance can significantly change if more constraints, such as energy, communication range, resource capacities, are accounted.","PeriodicalId":224620,"journal":{"name":"2017 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134402990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Handover enhancement for LTE-Advanced and beyond heterogeneous cellular networks LTE-Advanced及以上异构蜂窝网络的切换增强
B. U. Kazi, Gabriel A. Wainer
{"title":"Handover enhancement for LTE-Advanced and beyond heterogeneous cellular networks","authors":"B. U. Kazi, Gabriel A. Wainer","doi":"10.23919/SPECTS.2017.8046767","DOIUrl":"https://doi.org/10.23919/SPECTS.2017.8046767","url":null,"abstract":"Heterogeneous networks (HetNets) are considered a promising cellular network architecture to provide services to the massive number of subscribers. However, in heterogeneous networks, as cell size becomes smaller, the number of handovers and handover failure increase significantly. Therefore, mobility management becomes an important issue in HetNets. In this research, we analyzed the handover parameters, and proposed a novel handover method for heterogeneous cellular networks to minimize the number of handovers and handover failure. In the proposed method, we considered dual connectivity with control and data plane split and Coordinated Multipoint (CoMP) transmission to optimize the handover parameters. The reduction of handover improves the network performance and the handover failure reduction improves the user experience. The simulation results show that the proposed handover process significantly reduces the number of handovers in heterogeneous cellular networks.","PeriodicalId":224620,"journal":{"name":"2017 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124205078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Attribute based sharing in cybersecurity information exchange framework 网络安全信息交换框架中基于属性的共享
Iman Vakilinia, Deepak K. Tosh, S. Sengupta
{"title":"Attribute based sharing in cybersecurity information exchange framework","authors":"Iman Vakilinia, Deepak K. Tosh, S. Sengupta","doi":"10.23919/SPECTS.2017.8046770","DOIUrl":"https://doi.org/10.23919/SPECTS.2017.8046770","url":null,"abstract":"As the complexity of the cyber attacks are increasing, there is a growing demand for proactive defense against them. CYBersecurity information EXchange (CYBEX) is playing a crucial role to implement proactive defense. CYBEX conveys organizations' sensitive information which demands proper access control management. However, previous works in this area do not consider access control for CYBEX. In this work, we tackle the access control problem in CYBEX. We model the attribute based access control in CYBEX with a semi-trusted sharing server. To achieve attribute based access control in CYBEX, our mechanism is developed based on the concepts of ciphertext policy attribute based encryption (CP-ABE) [1] and STIX [2]. The mechanism's workflow is as follows, at the beginning users claim their attributes from attribute authorities, then a key generation center generates decryption keys for users based on their attributes. For the sharing, organizations embed access control to their shared data. This is conducted by encrypting sensitive information such that only users with appropriate attributes can decrypt them. Security analysis, implementation and performance evaluation indicate the effectiveness and efficiency of the mechanism.","PeriodicalId":224620,"journal":{"name":"2017 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131090512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Estimation of network load and downlink throughput using RF scanner data for LTE networks 使用LTE网络的射频扫描器数据估计网络负载和下行链路吞吐量
Kwangrok Chang, R. Wicaksono
{"title":"Estimation of network load and downlink throughput using RF scanner data for LTE networks","authors":"Kwangrok Chang, R. Wicaksono","doi":"10.23919/SPECTS.2017.8046779","DOIUrl":"https://doi.org/10.23919/SPECTS.2017.8046779","url":null,"abstract":"This paper provides a methodology of estimating downlink throughput using the drive test data collected by an RF scanner device rather than obtaining the downlink throughput via FTP downloading from UE. The throughput test using the UE's FTP application to perform the throughput test has a merit of presenting the packet data speed from the end user perspective however, it also has significant shortcomings such as multiple RF layers cannot be tested simultaneously as UE can have only a single radio connection to eNB and no analytic performance benchmarking between different LTE networks is possible. The proposed algorithm utilizes the simple measurement quantities collected by an RF scanner in order to estimate the LTE network's traffic load and the available PRBs without relying on network parameters or site information. Furthermore, the proposed algorithm calculates the potential downlink throughput at each location at which the RF scanner measured RSRP, RSRQ and SINR assuming that the available PRBs of the LTE cell are fully utilized at the location. Since the RF scanner is capable of measuring the multiple RF layers simultaneously, the proposed algorithm enables whole LTE networks to be benchmarked comprehensively. In addition, the proposed algorithm helps in analytically determining the root causes of the superiority or inferiority of a LTE network whether it is due to traffic load, system bandwidth, or spectrum efficiency.","PeriodicalId":224620,"journal":{"name":"2017 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124934302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信