2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)最新文献

筛选
英文 中文
Deploying Time-based Sampling Techniques in Software-Defined Networking 在软件定义网络中部署基于时间的采样技术
David R. Teixeira, J. M. Silva, S. R. Lima
{"title":"Deploying Time-based Sampling Techniques in Software-Defined Networking","authors":"David R. Teixeira, J. M. Silva, S. R. Lima","doi":"10.23919/SOFTCOM.2018.8555763","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2018.8555763","url":null,"abstract":"Network data volumes have seen a substantial increase in recent years, in part due to the massive use of mobile devices, the dissemination of streaming services and the rise of concepts such as IoT. This growing trend highlights the need to improve network monitoring systems to cope with challenges related with performance, flexibility and security. SoftwareDefined Networking (SDN) and traffic sampling techniques can be combined to provide a toolset that can be used for enhancing network management activities and performance evaluation. In this context, this paper presents a proposal for supporting timebased sampling techniques in SDN, providing network statistics at the controller level and allowing the self-configuration of traffic sampling in network devices. The proposed solution, designed to improve the efficiency and flexibility of network measurement systems, takes into account the underlying need to establish a balance between the reliability of the collected data and the computational effort involved in the sampling process. The proof-of-concept results emphasize the potential of applying and configuring different time-based sampling techniques through a SDN framework and a small set of standard OpenFlow messages. Comparative results on the accuracy and overhead of each technique when sampling real traffic traces are also provided.","PeriodicalId":227652,"journal":{"name":"2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115387570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Fast Transport for Edge Computing in 5G Networks 5G网络边缘计算的快速传输
Å. Arvidsson, L. Westberg
{"title":"Fast Transport for Edge Computing in 5G Networks","authors":"Å. Arvidsson, L. Westberg","doi":"10.23919/SOFTCOM.2018.8555815","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2018.8555815","url":null,"abstract":"We consider TCP performance for cloud services in 5G cellular networks and show that edge clouds offer the highest throughput, but that further improvements still are possible. To this end we devise a concept where edge clouds connected directly to the radio access network can increase their transmission rates by relying on the built in re-transmissions (through quality of service features) and on the built in user fairness (through per-user buffers and scheduler policies). We use numerical examples from measurements in real networks to demonstrate that the concept is efficient and significantly improves the effective throughput beyond what placement alone can do, and we also outline possible further improvements.","PeriodicalId":227652,"journal":{"name":"2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121027230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fountain Data Estimation within Bayesian model Classification in Wireless Sensor Network 无线传感器网络中贝叶斯模型分类中的喷泉数据估计
F. Belabed, R. Bouallègue
{"title":"Fountain Data Estimation within Bayesian model Classification in Wireless Sensor Network","authors":"F. Belabed, R. Bouallègue","doi":"10.23919/SOFTCOM.2018.8555754","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2018.8555754","url":null,"abstract":"In this paper, a novel distributed estimation scheme is proposed. This model combines learning methods and fountain codes. In order to minimize the number of transmissions as well as the impact of useless data, we determine the optimal minimal number of encoded packets needed for a successful decoding. Sensor observations are encoded using fountain codes. Then messages are collected at the cluster head where a final estimation is provided with a classification based on Bayes rules. The main goal of this paper is to estimate the needed number of encoded packets according to a Bayesian method. The performance results have been analyzed through a comparison with the Support Vector Machine.","PeriodicalId":227652,"journal":{"name":"2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"433 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122870960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Misdetection Probability Analyses of OFDM Signals in Energy Detection Cognitive Radio Systems 能量检测认知无线电系统中OFDM信号的误检概率分析
J. Lorincz, D. Begusic, I. Ramljak
{"title":"Misdetection Probability Analyses of OFDM Signals in Energy Detection Cognitive Radio Systems","authors":"J. Lorincz, D. Begusic, I. Ramljak","doi":"10.23919/SOFTCOM.2018.8555811","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2018.8555811","url":null,"abstract":"Cognitive radio (CR) networks are an intelligent wireless communication technology that is aware of its surrounding environment. The main process of the cognitive radio is spectrum sensing. Energy detection (ED) method was found to be a promising candidate for spectrum sensing in the CR networks. However, the detection performance of the ED method is susceptible to noise fluctuations at the receiver side, known as noise uncertainty. To obtain better performance when noise uncertainty impacts ED process, it is necessary to incorporate a dynamic signal detection based on sensing threshold adaptation. In this paper, the influence of noise uncertainty and dynamic threshold adaptation for the ED of signals transmitted using orthogonal frequency division modulation (OFDM) is investigated. The major contribution of this work is the analyses of the influence of different parameters including: modulation constellations, noise uncertainty level, dynamic threshold and signal to noise ratio values on a probability of received signal misdetection. Simulation results show that a combination of some of the analysed parameters can significantly improve ED process for OFDM signals.","PeriodicalId":227652,"journal":{"name":"2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130374823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Enhanced Extended Access Barring Mechanism for Massive Machine-Type Communications in 5G Context 5G环境下海量机器类通信的增强型扩展接入限制机制
S. Alaya, Mohamed Tahar Missaoui, M. Frikha
{"title":"Enhanced Extended Access Barring Mechanism for Massive Machine-Type Communications in 5G Context","authors":"S. Alaya, Mohamed Tahar Missaoui, M. Frikha","doi":"10.23919/SOFTCOM.2018.8555739","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2018.8555739","url":null,"abstract":"The random-access procedure used to support Machine to Machine (M2M) or Machine-Type Communications (MTC), does not provide efficient support for high user loads. This is due to the Slotted ALOHA used as an access protocol for the transmission of preambles and the use of random back-offs in case of Random Access Channel (RACH) failure. With the expected explosion of the number of devices in the coming years, the need for an efficient design to manage the access to the network becomes an urgent key issue especially with the reduced number of preambles available to perform the RACH procedure. To this end, the Third Generation Partnership Project (3GPP) proposed the Extended Access Barring (EAB) mechanism as a solution to control overload for MTC devices. In this paper, we propose an enhancement of the 3GPP EAB mechanism by expanding the contention space statically and dynamically with the aim to reduce collisions and to increase the success probability and therefore to fulfill constraints in terms of delay and energy consumption. An analytical approach along with simulations are provided in this paper to show the impact of this contention space expansion on the performance of the existing 3GPP EAB mechanism.","PeriodicalId":227652,"journal":{"name":"2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130383664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigation of Nonlinear Amplifier Distortion for CP-OFDM Based Cognitive Radio Systems 基于CP-OFDM的认知无线电系统中非线性放大器失真的缓解
Hanen Lajnef, M. Dakhli, M. Hizem, R. Bouallègue
{"title":"Mitigation of Nonlinear Amplifier Distortion for CP-OFDM Based Cognitive Radio Systems","authors":"Hanen Lajnef, M. Dakhli, M. Hizem, R. Bouallègue","doi":"10.23919/SOFTCOM.2018.8555744","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2018.8555744","url":null,"abstract":"To reach a high data rate Quality of Service (QoS), the fifth generation (5G) was combined with the promising technology Cognitive Radio (CR), which can address the spectrum scarcity problem by means of dynamic spectrum sensing (SS). Therefore, the (SS) is an essential requirement of CR which detects and share the unused spectrum without having harmful interference on other users. In this paper, we investigate the effect of nonlinear distortions due to high-power amplifier (HPA) on the performances of the OFDM-CR system (orthogonal frequency division multiplexing based on cognitive radio). Afterward, in order to improve its performance, an iterative compensation algorithm employing the Nonlinear Distortion cancellation (NDC) principle was investigated.","PeriodicalId":227652,"journal":{"name":"2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115879657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NEMO: A Flexible Java-based Network Emulator NEMO:一个灵活的基于java的网络模拟器
Luca Davoli, Yanina Protskaya, L. Veltri
{"title":"NEMO: A Flexible Java-based Network Emulator","authors":"Luca Davoli, Yanina Protskaya, L. Veltri","doi":"10.23919/SOFTCOM.2018.8555769","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2018.8555769","url":null,"abstract":"Network emulation provides the capability to evaluate applications on standalone systems, representing a trade-off between real infrastructures and simulators, providing a lowlayer virtual network, and yet allowing real high-layer application code to be executed. Moreover, network emulation is useful to study and evaluate the behavior of applications in different conditions(maybe sometimes difficult to reach in real networks), in turn allowing a rapid deployment of hybrid real hardware/virtual network topologies. In this paper, a modular, flexible and highly scalable Java-based network emulator, denoted as NEMO, is proposed. NEMO can be integrated with external open-source Java applications or used as a virtualization mechanism, able to run third-party Java binary applications on a virtual node attached to either a virtual network or a real external network, in a completely transparent way for the end-user. Moreover, NEMO allows to plug in user-defined network components and run virtual networks composed by millions of nodes on a single end-user machine, as well as on a distributed infrastructure.","PeriodicalId":227652,"journal":{"name":"2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131657996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Efficient Multi-Group Key Management Protocol for Internet of Things 一种高效的物联网多组密钥管理协议
Mohamed Ali Kandi, Hicham Lakhlef, A. Bouabdallah, Y. Challal
{"title":"An Efficient Multi-Group Key Management Protocol for Internet of Things","authors":"Mohamed Ali Kandi, Hicham Lakhlef, A. Bouabdallah, Y. Challal","doi":"10.23919/SOFTCOM.2018.8555857","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2018.8555857","url":null,"abstract":"Internet of Things (IoT) is a network made up of a large number of devices which are able to automatically communicate to computer systems, people and each other providing various services for the benefit of society. One of the main challenges facing the IoT is how to secure communication between these devices. Among all the issues, the Group Key Management is one of the most difficult. Although different approaches have been proposed to solve it, most of them use the same security parameters to secure all communications. Thus, if several services are provided by the network, communications within a service will be accessible to all network members even those which did not subscribe to it. Moreover, the compromise of a member will jeopardize all services. In this paper, we propose a highly scalable Multi-Group Key Management protocol for IoT which ensures the forward and backward secrecy, efficiently recovers from collusion attacks and guarantees the secure coexistence of several services in a single network. To achieve this, our protocol manages several groups with independent security parameters.","PeriodicalId":227652,"journal":{"name":"2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128931067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Micro-Expressions Detection Based on Micro-Motions Dense Optical Flows 基于微运动密集光流的微表情检测
S. Nistor, A. Darabant, D. Borza
{"title":"Micro-Expressions Detection Based on Micro-Motions Dense Optical Flows","authors":"S. Nistor, A. Darabant, D. Borza","doi":"10.23919/SOFTCOM.2018.8555833","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2018.8555833","url":null,"abstract":"Micro-expressions are one of the most reliable sources of deceit detection. They are fast, involuntary facial movements and they usually occur when a person tries to hide their true feelings. This paper presents a novel method for micro-expression detection in high speed video-sequences. We first define several free-form regions of interest on the face based on the location of the muscles of facial expression. Dense optical flow features are extracted from each region, and their magnitude and direction are used to spot micro-expressions in the video sequence. The direction of movement is used to filter out irrelevant, macro movements. The proposed algorithm for micro-expression detection is training free and it involves a simple voting procedure on the movement magnitude from each region. The proposed method was tested on a publicly available database.","PeriodicalId":227652,"journal":{"name":"2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133626647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Designing a Private CDN with an Off-Sourced Network Infrastructure: Model and Case Study 使用外包网络基础设施设计私有CDN:模型和案例研究
C. Canali, A. Corbelli, R. Lancellotti
{"title":"Designing a Private CDN with an Off-Sourced Network Infrastructure: Model and Case Study","authors":"C. Canali, A. Corbelli, R. Lancellotti","doi":"10.23919/SOFTCOM.2018.8555766","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2018.8555766","url":null,"abstract":"Content Delivery Networks for multimedia contents are typically managed by a dedicated company. However, there are cases where an enterprise already investing in a dedicated network infrastructure wants to deploy its own private CDN. This scenario is quite different from traditional CDNs for a twofold reason: first, the workload characteristics; second, the impact on the available choices for the CDN design of having the management of the network infrastructure off-sourced to a third party. The contribution of this paper is to introduce and discuss the optimization models used to design the private CDN and to validate our models using a case study.","PeriodicalId":227652,"journal":{"name":"2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132287901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信