{"title":"Selfish allocation avoidance for P2P file application: A game theoretic approach","authors":"Fang Zuo, Wei Zhang","doi":"10.1109/ICON.2012.6506598","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506598","url":null,"abstract":"In this paper, we focus and solve the selfish allocation-problem that is different from the previously studied version in three ways that make it more accurately reflective of real world P2P allocation: (1) we treat the nodes as strategic agents and treat the replica allocation as a deliberate auction where node is incentivized to give his true quality of service for getting the replica; (2) our mechanism computes node utility for all possible replica destination and payments for those destination nodes, and the best appropriate node can be selected as the final placement destination (3) we show how to compute our mechanism with a distributed algorithm that is a straightforward extension to P2P allocation method and causes a overhead in convergence time. This approach of using an existing protocol as a substrate for distributed computation may prove useful in future development of P2P allocation algorithms. Our design and analysis of a strategy proof, feasible, VCG-based routing mechanism provides a new, promising direction in distributed algorithmic mechanism design, which has heretofore been focused mainly on P2P application.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116687480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A scalable pipeline architecture for IPv4/IPv6 route lookup","authors":"Yi Wu, Ge Nong","doi":"10.1109/ICON.2012.6506594","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506594","url":null,"abstract":"When the Internet is evolving from IPv4 to IPv6, there is a need in practice for route lookup algorithms that can simultaneously support IPv4 and IPv6 packets. A scalable pipeline routing architecture for route lookups of IPv4/IPv6 packets using a prefix trie is studied in this work. In this routing architecture, a routing table is mapped into an index table and a number of prefix tries. Each prefix trie is further divided into multiple subtries, where two copies are maintained for each subtrie. Specifically, each subtrie has two copies rooted in two different memory blocks. For each copy of a subtrie, the root node is stored in a randomly selected memory block and the other descendant nodes are cyclically stored in the subsequent memory blocks in a manner of one level per block. The scheduling problem in such an architecture is modeled as bipartite matching between packets and memory blocks. For performance evaluation, extensive simulation experiments have been conducted for typical IPv4 and IPv6 corpora. The simulation results indicate that this routing architecture can achieve high system's throughputs under both IPv4 and IPv6 traffic loads.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116709464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Bharanidharan, Xue Jun Li, Yunye Jin, Jaya Shankar Pathmasuntharam, Gaoxi Xiao
{"title":"Design and implementation of a real time locating system utilizing Wi-Fi signals from iPhones","authors":"M. Bharanidharan, Xue Jun Li, Yunye Jin, Jaya Shankar Pathmasuntharam, Gaoxi Xiao","doi":"10.1109/ICON.2012.6506573","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506573","url":null,"abstract":"Real time locating system (RTLS) becomes increasingly popular due to its wide application and fast growth as indicated by the number of mobile devices. Instead of the conventional received signal strength indication (RSSI) fingerprinting method that performs wireless localization by collecting the received signal strength (RSS) for beacons from Wi-Fi access points (APs), in this paper we studied and implemented an alternative approach of utilizing APs in monitoring mode to collect the RSSIs for Wi-Fi signals from a mobile device. We focused on two parameters, location of the mobile users with the RSSI of the incoming packets to Wi-Fi networks, to a RTLS in indoor environment. Wi-Fi networks are chosen due to their well-known features like cost effectiveness and existing infrastructure in all domains as in industries, hospitals and various educations institutions. We implemented the packet capture library, through which we obtained the received signal strength value of the incoming packets sent from the mobile station at the wireless access points. By applying a localization algorithm similar to the well-know k-nearest neighbor (kNN), we have calculated the location coordinates of the user. Experimental results show that this approach can achieve better localization accuracy than the conventional approach.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126518449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic real-time scheduling with task migration for handling bag-of-tasks applications on clusters","authors":"Menglan Hu, Jun Luo","doi":"10.1109/ICON.2012.6506561","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506561","url":null,"abstract":"The scheduling of real-time tasks on clusters is a critical issue for offering quality-of-service (QoS) assurance. A significant challenge in real-time task scheduling is to support various types of applications. In this paper we focus on the scheduling of bag-of-tasks (BoT) applications consisting of many independent tasks. BoT applications are a typically “embarrassingly parallel” type of applications which widely exist in various fields in science and engineering. We propose a dynamic (online) real-time scheduling algorithm referred to as scheduling algorithm with migration (SAM) for handling real-time BoT applications on cluster systems. SAM schedules tasks to the minimum number of processors so that computation power can be saved for unscheduled large tasks. SAM also utilizes task migration to optimize load balancing without undermining the schedulability of the tasks. Performance evaluation results are presented to demonstrate the effectiveness and competitiveness of our approaches when compared to existing algorithms.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"387 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126739361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Molecular communication model through gap junction channel with selective permeabilities","authors":"Yiqun Yang, C. Yeo","doi":"10.1109/ICON.2012.6506566","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506566","url":null,"abstract":"With rapid development in biological and nano areas, new communication methods promise novel solutions for various research issues. Due to the simple structure and the limited size of nanomachines, nanonetworks have conspicuous differences from traditional networks. Hence exploratory analysis and theory are expected. Molecular communication, which involves biological components in nanoscale, provides a more compatible approach to medical, environmental and agricultural research. Calcium ion (Ca2+), which is one of the most important universal second messengers in vivo cells, participates actively in the regulation of cellular activities. In this paper, we model the molecular communication system through gap junction channels. We present simulation results for patterned cells with different permeabilities. We analyze the propagation characteristics of intercellular calcium waves which are induced by the diffusion of inositol (l, 4, 5)-trisphosphate (IP3).","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126818959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yu Wang, X. Jing, J. Y. Tham, W. S. Lee, K. Goh, Yao Zhao
{"title":"Distortion estimation for compressed video transmission over mobile networks","authors":"Yu Wang, X. Jing, J. Y. Tham, W. S. Lee, K. Goh, Yao Zhao","doi":"10.1109/ICON.2012.6506583","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506583","url":null,"abstract":"A compressed-domain distortion model is proposed for lossy transmission of compressed video. The model has low complexity and is suitable for real-time mobile applications, where resources are limited, to perform network resource allocation, performance control and system optimization. Simulation on various test sequences has demonstrated the robustness and accuracy of this model.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129929879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New developments in network forensics — Tools and techniques","authors":"R. Hunt","doi":"10.1109/ICON.2012.6506587","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506587","url":null,"abstract":"Network forensics is a branch of digital forensics which has evolved recently as a very important discipline used in monitoring and analysing network traffic — particularly for the purposes of tracing intrusions and attacks. This paper presents an analysis of the tools and techniques used in network forensic analysis. It further examines the application of network forensics to vital areas such as malware and network attack detection; IP traceback and honeypots; and intrusion detection. Further, the paper addresses new and emerging areas of network forensic development which include critical infrastructure forensics, wireless network forensics, as well as its application to social networking.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114961416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emerging Wireless Personal Area Networks (WPANs): — An analysis of techniques, tools and threats","authors":"R. Hunt","doi":"10.1109/ICON.2012.6506569","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506569","url":null,"abstract":"Wireless Personal Area Networks provide a pivotal role in local area network technology complementing traditional Wireless Local Area Network technologies. Bluetooth, ZigBee and NFC (Near Field Communications) have emerged as key WPAN technologies with UWB (Ultra Wide Band) standards currently evolving. They are however subject to the usual range of security vulnerabilities found in wireless LANs such as spoofing, snooping, man-in-the-middle, denial of service and other attacks. However security in WPANs is not as mature as it is in Wireless LANs and further work is needed in order to provide comparable protection. This paper examines a range of WPAN technologies and security issues and proposes protection mechanisms that can mitigate risk in each case.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126567652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}