2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery最新文献

筛选
英文 中文
A Trust Management Model in Centralized Cognitive Radio Networks 集中式认知无线网络中的信任管理模型
Qingqi Pei, Rui Liang, Hongning Li
{"title":"A Trust Management Model in Centralized Cognitive Radio Networks","authors":"Qingqi Pei, Rui Liang, Hongning Li","doi":"10.1109/CyberC.2011.104","DOIUrl":"https://doi.org/10.1109/CyberC.2011.104","url":null,"abstract":"Cognitive radio network is composed of many cognitive users with sensing and learning modules, and its spectrum allocation changes from the primary user exclusive the resource to both users sharing the licensed spectrum. Trustworthy data of the perception and learning is the most important precondition whether the decision-making is fair and accurate. In this paper, a trust management model for centralized cognitive radio networks is proposed, which is on the base of the social sciences to build a trust mechanism through the whole cognitive cycle to solve the security threats brought by the untrustworthy entities, such as selfish, malicious, and faultless nodes. Analysis shows that the model can detect the malicious behavior and improve the fairness and robustness of the network.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128150429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A Simplified Solution of a PEPA Model of Kerberos Protocol Kerberos协议PEPA模型的简化解
Yishi Zhao, N. Thomas
{"title":"A Simplified Solution of a PEPA Model of Kerberos Protocol","authors":"Yishi Zhao, N. Thomas","doi":"10.1109/CyberC.2011.50","DOIUrl":"https://doi.org/10.1109/CyberC.2011.50","url":null,"abstract":"In this paper an authentication protocol, Kerberos, is investigated. To consider the scenario where there are multiple realms, a simplification is applied. The simplified model is equivalent to original model in terms of the steady state distribution. It is analysed numerically using a fluid flow approximation and is verified by stochastic simulation.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128545636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Noise-Robust EASI Algorithm for Noisy Blind Interference-Signal Separation 噪声盲干扰信号分离的EASI算法
Yu-ling Duan, Hang Zhang
{"title":"A Noise-Robust EASI Algorithm for Noisy Blind Interference-Signal Separation","authors":"Yu-ling Duan, Hang Zhang","doi":"10.1109/CyberC.2011.92","DOIUrl":"https://doi.org/10.1109/CyberC.2011.92","url":null,"abstract":"This paper presents an improved Equivariant Adaptive Separation via Independence (EASI) algorithm to deal with the blind interference-signal separation in the noisy circumstance. This algorithm gets an unbiased estimate for separation matrix by adopting the noise bias removal technique, then, eliminates the noise in the estimate signals according to the probability density function (PDF) of the noise farther. The simulation result shows that the separation performance of the proposed algorithm is better and the error bit ratio (BER) is lower than those of the conventional EASI algorithm under the same signal noise ratio (SNR) case.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"242 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133637448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Framwork for a University Display Platform by Using Cloud Computing 基于云计算的高校展示平台框架
Zhen-heng Liu, Changxin Zhang, T. Reynolds
{"title":"A Framwork for a University Display Platform by Using Cloud Computing","authors":"Zhen-heng Liu, Changxin Zhang, T. Reynolds","doi":"10.1109/CyberC.2011.75","DOIUrl":"https://doi.org/10.1109/CyberC.2011.75","url":null,"abstract":"This paper discusses to use of cloud computing technology to provide a flexible virtual platform for teachers and students in university to display their creative artifacts on the Internet. The authors compare two kinds of virtualisation technology and introduce the system architecture for the creative platform. The platform allows teachers and students to display their achievements by using the unified portal. It can be used to improve the creative ability of users and save hardware and software resources in university.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131398290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Approach to Improving Trust Estimation in Service-Based Systems 一种改进基于服务系统信任估计的方法
S. Yau, Peng Sun
{"title":"An Approach to Improving Trust Estimation in Service-Based Systems","authors":"S. Yau, Peng Sun","doi":"10.1109/CyberC.2011.64","DOIUrl":"https://doi.org/10.1109/CyberC.2011.64","url":null,"abstract":"Service-based systems (SBSs) are distributed systems which have many advantages, including rapid composition of services for distributed applications. In these systems, various capabilities are provided by service providers as services interconnected by networks. It is important for users of SBSs to have confidence in the trustworthiness of service providers. Existing approaches to trust estimation for SBSs do not incorporate human factors, such as interpersonal relationships. In addition, the trust computation in existing trust models is based on pairwise relationship, which does not include the transitivity of trust. In this paper, an approach to improving the trust estimation for SBSs by incorporating two important aspects of interpersonal relationships is presented.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"443 1-3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116584024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
QoS Evaluation of HTTP over Satellites 基于卫星的HTTP服务质量评价
L. Audah, Zhili Sun, H. Cruickshank
{"title":"QoS Evaluation of HTTP over Satellites","authors":"L. Audah, Zhili Sun, H. Cruickshank","doi":"10.1109/CyberC.2011.38","DOIUrl":"https://doi.org/10.1109/CyberC.2011.38","url":null,"abstract":"This paper presents the studies for the end-to-end QoS of IP over integrated terrestrial and Next Generation Satellite Network (NGSN) using HTTP web application. We compare between Big-LEO and EuroSkyWay like satellites constellations for the QoS parameters (e.g. delay, loss ratio, throughput and connection duration) of request-response HTTP connections from a remote server in London and a remote client in Boston. We model the HTTP request-response with multiple connections and response files sizes variations. We create the network scenario with error model to simulate the transmission loss environment using NS-2 simulation software. A Differentiated Services (Diffserv) queue interface is placed in the terrestrial network on the server side to regulate and differentiate the traffic flows across the narrow bandwidth of the satellite links. The results showed a good performance evaluation comparison of the QoS parameters involved in the HTTP web communications across LEO and GEO satellite systems.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122337238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A QoS Approach for Detecting and Managing a Fault Alarm Storm 基于QoS的故障告警风暴检测与管理方法
Jian Yang, Li Li, Su-bin Shen, C. Yang
{"title":"A QoS Approach for Detecting and Managing a Fault Alarm Storm","authors":"Jian Yang, Li Li, Su-bin Shen, C. Yang","doi":"10.1109/CyberC.2011.30","DOIUrl":"https://doi.org/10.1109/CyberC.2011.30","url":null,"abstract":"When a large communication network encounters abnormal situations, such as multiple cable cuts or a failure of interface protocol leading to large numbers of propagating alarms may potentially cause many symptom events in multiple network domains. As a result, a network management system may be overwhelmed with a heavy alarm load scenario (a.k.a alarm storm). Appropriate fault management tools are required to provide auto-monitoring capabilities which indicate the health and status of the system and auto-alerting capabilities, which alert to conditions that impact system performance. This paper provides a method and strategy for managing a fault alarm storm by detecting unusual system performance behavior and implementing a reliably handling mechanism to maintain adequate system application performance. The paper explores a QoS approach to calculate inter-process latency based on dynamic states of various types of alarms and behaviors of system performance. It provides quality of service trending projection functionality of inter-process latency to manage CPU and memory capacity and to trigger the control mechanism in order to protect system resources. Based on this approach, it enables more efficient/accurate system performance measurement algorithms to handle the most import alarms need to be taken care of at the most critical situations.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127233446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Method Based on Kalman Filtering Theory for Solving Two Point Boundary Value Problems 基于卡尔曼滤波理论求解两点边值问题的新方法
Zhaohui Dang, Yulin Zhang
{"title":"A New Method Based on Kalman Filtering Theory for Solving Two Point Boundary Value Problems","authors":"Zhaohui Dang, Yulin Zhang","doi":"10.1109/CyberC.2011.57","DOIUrl":"https://doi.org/10.1109/CyberC.2011.57","url":null,"abstract":"This paper describes a simple and efficient approach to the two point boundary value problem. This approach based on the Kalman filtering theory has an ingenious iteration form. The calculated results are in excellent agreement with exact solutions. Some examples indicate that the new method has higher precision than Simple Shooting method.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124180313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using UICDS to Share Data in the Real-Time Decision Support System for Pandemic Response 在大流行应对的实时决策支持系统中使用UICDS共享数据
Robert Kelley, Aman Gupta, Anup Kumar, S. Heragu
{"title":"Using UICDS to Share Data in the Real-Time Decision Support System for Pandemic Response","authors":"Robert Kelley, Aman Gupta, Anup Kumar, S. Heragu","doi":"10.1109/CyberC.2011.106","DOIUrl":"https://doi.org/10.1109/CyberC.2011.106","url":null,"abstract":"This paper presents our experience using the Unified Incident Command Decision Support System (UICDS) middleware platform developed by the U.S. Department of Homeland Security to facilitate sharing data between our Real-Time Decision Support System (RTDSS) and third party data sources. We describe the basics of UICDS and further show how we integrated UICDS one of our projects.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115581519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Non-Bayesian Learning of Channel Sensing Order for Dynamic Spectrum Access Networks 动态频谱接入网络中信道感知顺序的非贝叶斯学习
Bowen Li, Panlong Yang, Jinlong Wang, Qi-hui Wu, Nan Xia
{"title":"Non-Bayesian Learning of Channel Sensing Order for Dynamic Spectrum Access Networks","authors":"Bowen Li, Panlong Yang, Jinlong Wang, Qi-hui Wu, Nan Xia","doi":"10.1109/CyberC.2011.91","DOIUrl":"https://doi.org/10.1109/CyberC.2011.91","url":null,"abstract":"In this paper, we consider sequential channel sensing and accessing with unknown channel availability probabilities. In such sequential channel sensing framework, it is critical important to arrange the channel sensing order properly at the beginning of each time slot, so as to balance the tradeoff between finding an idle channel as soon as possible in current slot (exploitation by sensing currently looks better channel preferentially) and making the channel statistics more precise to benefit the following sensing order arrangement (exploration by sensing the channels currently looks suboptimal). To handle this tradeoff balancing problem, we propose five online learning algorithms: Pure Exploitation (PE), Exploitation with Optimism Initial Estimation (EOIE), UCB-based Order (UCBO), $varepsilon$-greedy Order and SoftMax Order. The latter three algorithms are extended from three classic algorithms on handling multi-armed bandit problem: UCB1cite{Auer_02}, $varepsilon$-greedycite{Cesa_98} and SoftMaxcite{Cesa_98}. Among these algorithms, UCBO is the only one that we have proved to be a zero-regret strategy, which means the system is guaranteed to achieve optimal sensing order by applying UCBO, if enough slots are played. We then evaluate the algorithms by simulations. The results are a little surprising but meaningful. We find that the PE algorithm, which is treated as a simple strategy with poor performance for traditional multi-armed bandit problems, performs very well in the order learning problem when the number of channels is small. And our proposed EOIE algorithm performs nearly optimal in all cases. In contrast, the UCB-based Order converges too slowly for actual application, although it provides theoretical zero-regret guarantee as we have proved.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114964910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信