2008 IEEE/ACS International Conference on Computer Systems and Applications最新文献

筛选
英文 中文
A new, efficient coordinated checkpointing protocol combined with selective sender-based message logging 一种新的、高效的协调检查点协议,结合了选择性的基于发送方的消息记录
2008 IEEE/ACS International Conference on Computer Systems and Applications Pub Date : 2008-03-31 DOI: 10.1109/AICCSA.2008.4493571
C. Rao, M. M. Naidu
{"title":"A new, efficient coordinated checkpointing protocol combined with selective sender-based message logging","authors":"C. Rao, M. M. Naidu","doi":"10.1109/AICCSA.2008.4493571","DOIUrl":"https://doi.org/10.1109/AICCSA.2008.4493571","url":null,"abstract":"Checkpointing and message logging are the popular and general-purpose tools for providing fault- tolerance in distributed systems. The most of the Coordinated checkpointing algorithms available in the literature have not addressed about treatment of the lost messages and these algorithms suffer from high output commit latency. To overcome the above limitations, we propose a new coordinated checkpointing protocol combined with selective sender-based message logging. The protocol is free from the problem of lost messages. The term 'selective' implies that messages are logged only within a specified interval known as active interval, thereby reducing message logging overhead. All processes take checkpoints at the end of their respective active intervals forming a consistent global state. Outside the active interval there is no checkpointing of process state. This protocol minimizes different overheads i.e. checkpointing overhead, message logging overhead, recovery overhead and blocking overhead. Unlike blocking coordinated checkpointing, the disk contentions are less in the proposed protocol.","PeriodicalId":234556,"journal":{"name":"2008 IEEE/ACS International Conference on Computer Systems and Applications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116974798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Modelling information generation in event-driven sensor networks 事件驱动传感器网络信息生成建模
2008 IEEE/ACS International Conference on Computer Systems and Applications Pub Date : 2008-03-31 DOI: 10.1109/AICCSA.2008.4493621
G. Balasubramanian, S. Chakrabarti
{"title":"Modelling information generation in event-driven sensor networks","authors":"G. Balasubramanian, S. Chakrabarti","doi":"10.1109/AICCSA.2008.4493621","DOIUrl":"https://doi.org/10.1109/AICCSA.2008.4493621","url":null,"abstract":"Event-driven wireless sensor networks gain precedence over data-driven networks due to the effective manner in which they reduce the redundancy in data transmitted. In this paper, an attempt has been made to model the events of information generation and dissemination in an event driven wireless sensor network with uniformly distributed sensor nodes. Two existing definitions for the lifetime of sensor network have been used and a comparison of performance metrics like network lifetime, packet throughput and energy utilization have been made. Furthermore the concept of data aggregation has been incorporated into the developed model and the improvement in performance is observed.","PeriodicalId":234556,"journal":{"name":"2008 IEEE/ACS International Conference on Computer Systems and Applications","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127282004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Redundant optical data transmission using semiconductor lasers 利用半导体激光器的冗余光数据传输
2008 IEEE/ACS International Conference on Computer Systems and Applications Pub Date : 2008-03-31 DOI: 10.1109/AICCSA.2008.4493675
H. Wacker, J. Börcsök, H. Hillmer
{"title":"Redundant optical data transmission using semiconductor lasers","authors":"H. Wacker, J. Börcsök, H. Hillmer","doi":"10.1109/AICCSA.2008.4493675","DOIUrl":"https://doi.org/10.1109/AICCSA.2008.4493675","url":null,"abstract":"This paper is dealing with redundant optoelectronic data transmission with special respect to laser channels. The concept of the generalized erasure channel (GEC) is used to determine the probability of undetected error for some binary symmetric and non-symmetric channels protected by appropriate codes. In detail, communication via different binary symmetric channels (BSCs), generalized erasure channels and symmetrized binary non symmetric channels (BNSCs) is investigated. Simple upper bounds are given, relating the new formulas to that one of the BSC Finally the results in connection with an inequality for proper codes are applied to multi wavelength optical transmission through channels generated by semiconductor lasers.","PeriodicalId":234556,"journal":{"name":"2008 IEEE/ACS International Conference on Computer Systems and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124882964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Semantic-based image retrieval: A fuzzy modeling approach 基于语义的图像检索:一种模糊建模方法
2008 IEEE/ACS International Conference on Computer Systems and Applications Pub Date : 2008-03-31 DOI: 10.1109/AICCSA.2008.4493589
A. Lakdashti, M. Moin, K. Badie
{"title":"Semantic-based image retrieval: A fuzzy modeling approach","authors":"A. Lakdashti, M. Moin, K. Badie","doi":"10.1109/AICCSA.2008.4493589","DOIUrl":"https://doi.org/10.1109/AICCSA.2008.4493589","url":null,"abstract":"In this paper, we propose a new fuzzy based image retrieval approach to reduce the semantic gap in content-based image retrieval systems. Our main contributions are: (1) an algorithm for reduction of feature space dimensionality, (2) a fuzzy modeling approach to model the expert human behavior in the image retrieval task, (3) a fuzzy system for semantic-based image retrieval, and (4) a training algorithm for creating the fuzzy rules. The proposed solution not only is a novel idea in the semantic-based image retrieval field, but also has enough potential in learning semantics from users and making a powerful approach to improve the performance of CBIR systems, as the results of our experiments on a set of 2000 images support our claim.","PeriodicalId":234556,"journal":{"name":"2008 IEEE/ACS International Conference on Computer Systems and Applications","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125138043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
DEVS-WSN : A discrete event approach for Wireless Sensor Network simulation DEVS-WSN:无线传感器网络仿真的离散事件方法
2008 IEEE/ACS International Conference on Computer Systems and Applications Pub Date : 2008-03-31 DOI: 10.1109/AICCSA.2008.4493637
T. Antoine-Santoni, J. Santucci, E. D. Gentili, B. Costa
{"title":"DEVS-WSN : A discrete event approach for Wireless Sensor Network simulation","authors":"T. Antoine-Santoni, J. Santucci, E. D. Gentili, B. Costa","doi":"10.1109/AICCSA.2008.4493637","DOIUrl":"https://doi.org/10.1109/AICCSA.2008.4493637","url":null,"abstract":"Zeigler in the 70 's introduced Discrete Event system Specification (DEVS) formalism. This formalism is able to describe the asynchronous nature of the events occuring in Wireless Sensor Network (WSN). In this paper we introduce a DEVS application oriented components for WSN : DEVS- WSN. Based on pyDEVS, it wants to provide a simulation tool based on a discrete event approach. Our model uses a detained definition of all node components and is independent of operating system. DEVS-WSN provides a framework to build quickly and easily a complex Wireless Sensor Network and to analyze several parameters at various levels of abstraction : hardware components, node, network.","PeriodicalId":234556,"journal":{"name":"2008 IEEE/ACS International Conference on Computer Systems and Applications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122786301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detecting flooding attacks against IP Multimedia Subsystem (IMS) networks 检测针对IMS (IP Multimedia Subsystem)网络的泛洪攻击
2008 IEEE/ACS International Conference on Computer Systems and Applications Pub Date : 2008-03-31 DOI: 10.1109/AICCSA.2008.4493627
Y. Rebahi, M. Sher, T. Magedanz
{"title":"Detecting flooding attacks against IP Multimedia Subsystem (IMS) networks","authors":"Y. Rebahi, M. Sher, T. Magedanz","doi":"10.1109/AICCSA.2008.4493627","DOIUrl":"https://doi.org/10.1109/AICCSA.2008.4493627","url":null,"abstract":"The IP multimedia subsystem (IMS) is an open IP based service infrastructure that enables an easy deployment of new rich multimedia services mixing voice and data. The IMS is considered as a next generation service delivery platform (SDP) on top of different wireless and wire line access networks. It is based on the session initiation protocol (SIP) which is gaining more and more acceptance in the VoIP market. As an emerging technology, the SIP standard will certainly be the target of denial of service (DoS) attacks and consequently IMS will also inherit this problem. Therefore, it is very important to protect IMS resources from DoS threats. In this paper, we suggest an efficient solution for protecting the IMS networks from such attacks.","PeriodicalId":234556,"journal":{"name":"2008 IEEE/ACS International Conference on Computer Systems and Applications","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123856699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
How can path diversity help transmission protocols in the achievement of a better connection QOS? 路径分集如何帮助传输协议实现更好的连接QOS?
2008 IEEE/ACS International Conference on Computer Systems and Applications Pub Date : 2008-03-31 DOI: 10.1109/AICCSA.2008.4493656
F. Melakessou, U. Sorger, Z. Suchanecki
{"title":"How can path diversity help transmission protocols in the achievement of a better connection QOS?","authors":"F. Melakessou, U. Sorger, Z. Suchanecki","doi":"10.1109/AICCSA.2008.4493656","DOIUrl":"https://doi.org/10.1109/AICCSA.2008.4493656","url":null,"abstract":"This contribution aims to show how path diversity can reduce the high variability of the Internet traffic. We attempt to improve the traffic behavior of a connection between two network entities. The most used transmission protocols as TCP and UDP are not capable to carry out all the traffic generated by the Internet as they lead to congestion and packet loss out of the connections required QoS. We present here the state of our research based on the discovery of disjoint connection paths on a network topology. We have designed a new transmission protocol that takes advantage of route diversity. We propose a TCP protocol based on Multiple Paths MPTCP for a data transmission between two network entities in a well-defined environment. Multipath routing and multipath transport protocols seem to be a relevant solution to avoid the drawbacks generated by the use of a single path for each data connection. MPTCP aims to avoid or reduce the congestions appearance and the high variability of the Internet traffic. A simulator has been developed on top of Scilab in order to evaluate the gain provided by the route diversity.","PeriodicalId":234556,"journal":{"name":"2008 IEEE/ACS International Conference on Computer Systems and Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123874504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new robust adaptive beamformer for enhancing speech corrupted with colored noise 一种新的鲁棒自适应波束形成器,用于增强受彩色噪声干扰的语音
2008 IEEE/ACS International Conference on Computer Systems and Applications Pub Date : 2008-03-31 DOI: 10.1109/AICCSA.2008.4493580
J. Mohammed
{"title":"A new robust adaptive beamformer for enhancing speech corrupted with colored noise","authors":"J. Mohammed","doi":"10.1109/AICCSA.2008.4493580","DOIUrl":"https://doi.org/10.1109/AICCSA.2008.4493580","url":null,"abstract":"In this paper, a new adaptive beamforming scheme is proposed for enhancing a speech signal degraded by additive colored noise signals in reverberant environment. The good performance of the standard GSC beamformer is severely impaired in complicated acoustic environments. The proposed beamformer uses a new adaptive blocking matrix, which consists of linear prediction error filters (LPEFs) and a multi-channel noise canceller using adaptive noise estimation filters (ANEFs). The new adaptive blocking matrix exploits the stationary characteristics of the speech signal over a short interval of time. Thus most of speech signal can be predicted by the linear prediction filters in the blocking matrix. On the other hand, the background noise signals becomes white. While the ANEFs in the multi-channel noise canceller reconstructs the background noise signals from whitened noise signals. Simulation results, in a noisy and reverberant environment with 0.3s reverberation time, show that the proposed beamformer produces results that are significantly favorable than standard GSC beamformer. Moreover, the proposed beamformer has been implemented in a real-time in a real environment using National Instruments NI-PXI-1042Q controller system and data acquisition card PXI-4472.","PeriodicalId":234556,"journal":{"name":"2008 IEEE/ACS International Conference on Computer Systems and Applications","volume":"486 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121162999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Mapping task graphs onto Network Processors using genetic algorithm 使用遗传算法将任务图映射到网络处理器上
2008 IEEE/ACS International Conference on Computer Systems and Applications Pub Date : 2008-03-31 DOI: 10.1109/AICCSA.2008.4493576
N. Weng, N. Kumar, S. Dechu, B. Soewito
{"title":"Mapping task graphs onto Network Processors using genetic algorithm","authors":"N. Weng, N. Kumar, S. Dechu, B. Soewito","doi":"10.1109/AICCSA.2008.4493576","DOIUrl":"https://doi.org/10.1109/AICCSA.2008.4493576","url":null,"abstract":"Network processors (NPs) are embedded system-on-a- chip multiprocessors that are optimized to perform simple packet processing tasks at data rates of several Gigabytes per second. They are the key components to build a performance-scalable and function-flexible network systems. To meet the performance demands of increasing link speeds and more complex network applications, NPs are implemented with several dozen of processor cores and run multiple packet processing applications in parallel. This trend makes it increasingly difficult for application developers to program NPs for high performance. This paper presents an automated task scheduling technique to address this parallel programming complexity. Our proposed technique is based on GA. By incorporating tasks dependency into scheduling list and encoding task scheduling list as a chromosome, GA can quickly remove the invalid mappings and evolve to the high quality solutions. This technique takes advantage of task-level and application-level parallelism to maximize system performance for a given NPs architecture. The simulation results show that this proposed technique can generate high quality mapping comparing to other heuristics by mapping some sample network applications. This work will also enable researchers and engineers to systematically evaluate and quantitatively understand the NPs system issues including application partitioning, architecture organizing, workload mapping and run-time operating.","PeriodicalId":234556,"journal":{"name":"2008 IEEE/ACS International Conference on Computer Systems and Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114533216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance analysis of identity management in the Session Initiation Protocol (SIP) SIP协议中身份管理的性能分析
2008 IEEE/ACS International Conference on Computer Systems and Applications Pub Date : 2008-03-31 DOI: 10.1109/AICCSA.2008.4493606
Y. Rebahi, J. Pallares, Tuan Nguyen, S. Ehlert, G. Kovács, D. Sisalem
{"title":"Performance analysis of identity management in the Session Initiation Protocol (SIP)","authors":"Y. Rebahi, J. Pallares, Tuan Nguyen, S. Ehlert, G. Kovács, D. Sisalem","doi":"10.1109/AICCSA.2008.4493606","DOIUrl":"https://doi.org/10.1109/AICCSA.2008.4493606","url":null,"abstract":"The Session Initiation Protocol (SIP) is a standard for managing IP multimedia sessions in the Internet. Identity management in SIP is a crucial security field that deals with identifying users in SIP networks and controlling their access to the corresponding resources. RFC 4474 describes a mechanism, based on certificates, for dealing with the SIP users identities. This RFC recommends the use of the RSA algorithm as it is currently the most popular public key cryptography system. The proliferation of small and simple devices as well as the need to increase the capacity of the SIP servers to handle the increasing VoIP traffic will make continued reliance on RSA more challenging over time. In this paper, we describe our implementation of the current RFC 4474, our integration of elliptic curves cryptography into this RFC and show that the corresponding performance is much more significant than the one where RSA is used. This paper can be considered as a first step in standardizing the use of elliptic curves in the identity management for SIP.","PeriodicalId":234556,"journal":{"name":"2008 IEEE/ACS International Conference on Computer Systems and Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116507463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信