2012 18th IEEE International Conference on Networks (ICON)最新文献

筛选
英文 中文
Selfish allocation avoidance for P2P file application: A game theoretic approach P2P文件应用的自私分配避免:一种博弈论方法
2012 18th IEEE International Conference on Networks (ICON) Pub Date : 2012-12-01 DOI: 10.1109/ICON.2012.6506598
Fang Zuo, Wei Zhang
{"title":"Selfish allocation avoidance for P2P file application: A game theoretic approach","authors":"Fang Zuo, Wei Zhang","doi":"10.1109/ICON.2012.6506598","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506598","url":null,"abstract":"In this paper, we focus and solve the selfish allocation-problem that is different from the previously studied version in three ways that make it more accurately reflective of real world P2P allocation: (1) we treat the nodes as strategic agents and treat the replica allocation as a deliberate auction where node is incentivized to give his true quality of service for getting the replica; (2) our mechanism computes node utility for all possible replica destination and payments for those destination nodes, and the best appropriate node can be selected as the final placement destination (3) we show how to compute our mechanism with a distributed algorithm that is a straightforward extension to P2P allocation method and causes a overhead in convergence time. This approach of using an existing protocol as a substrate for distributed computation may prove useful in future development of P2P allocation algorithms. Our design and analysis of a strategy proof, feasible, VCG-based routing mechanism provides a new, promising direction in distributed algorithmic mechanism design, which has heretofore been focused mainly on P2P application.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116687480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A scalable pipeline architecture for IPv4/IPv6 route lookup 一个可扩展的管道架构,用于IPv4/IPv6路由查找
2012 18th IEEE International Conference on Networks (ICON) Pub Date : 2012-12-01 DOI: 10.1109/ICON.2012.6506594
Yi Wu, Ge Nong
{"title":"A scalable pipeline architecture for IPv4/IPv6 route lookup","authors":"Yi Wu, Ge Nong","doi":"10.1109/ICON.2012.6506594","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506594","url":null,"abstract":"When the Internet is evolving from IPv4 to IPv6, there is a need in practice for route lookup algorithms that can simultaneously support IPv4 and IPv6 packets. A scalable pipeline routing architecture for route lookups of IPv4/IPv6 packets using a prefix trie is studied in this work. In this routing architecture, a routing table is mapped into an index table and a number of prefix tries. Each prefix trie is further divided into multiple subtries, where two copies are maintained for each subtrie. Specifically, each subtrie has two copies rooted in two different memory blocks. For each copy of a subtrie, the root node is stored in a randomly selected memory block and the other descendant nodes are cyclically stored in the subsequent memory blocks in a manner of one level per block. The scheduling problem in such an architecture is modeled as bipartite matching between packets and memory blocks. For performance evaluation, extensive simulation experiments have been conducted for typical IPv4 and IPv6 corpora. The simulation results indicate that this routing architecture can achieve high system's throughputs under both IPv4 and IPv6 traffic loads.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116709464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and implementation of a real time locating system utilizing Wi-Fi signals from iPhones 利用iphone Wi-Fi信号的实时定位系统的设计与实现
2012 18th IEEE International Conference on Networks (ICON) Pub Date : 2012-12-01 DOI: 10.1109/ICON.2012.6506573
M. Bharanidharan, Xue Jun Li, Yunye Jin, Jaya Shankar Pathmasuntharam, Gaoxi Xiao
{"title":"Design and implementation of a real time locating system utilizing Wi-Fi signals from iPhones","authors":"M. Bharanidharan, Xue Jun Li, Yunye Jin, Jaya Shankar Pathmasuntharam, Gaoxi Xiao","doi":"10.1109/ICON.2012.6506573","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506573","url":null,"abstract":"Real time locating system (RTLS) becomes increasingly popular due to its wide application and fast growth as indicated by the number of mobile devices. Instead of the conventional received signal strength indication (RSSI) fingerprinting method that performs wireless localization by collecting the received signal strength (RSS) for beacons from Wi-Fi access points (APs), in this paper we studied and implemented an alternative approach of utilizing APs in monitoring mode to collect the RSSIs for Wi-Fi signals from a mobile device. We focused on two parameters, location of the mobile users with the RSSI of the incoming packets to Wi-Fi networks, to a RTLS in indoor environment. Wi-Fi networks are chosen due to their well-known features like cost effectiveness and existing infrastructure in all domains as in industries, hospitals and various educations institutions. We implemented the packet capture library, through which we obtained the received signal strength value of the incoming packets sent from the mobile station at the wireless access points. By applying a localization algorithm similar to the well-know k-nearest neighbor (kNN), we have calculated the location coordinates of the user. Experimental results show that this approach can achieve better localization accuracy than the conventional approach.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126518449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dynamic real-time scheduling with task migration for handling bag-of-tasks applications on clusters 带任务迁移的动态实时调度,用于处理集群上的任务袋应用程序
2012 18th IEEE International Conference on Networks (ICON) Pub Date : 2012-12-01 DOI: 10.1109/ICON.2012.6506561
Menglan Hu, Jun Luo
{"title":"Dynamic real-time scheduling with task migration for handling bag-of-tasks applications on clusters","authors":"Menglan Hu, Jun Luo","doi":"10.1109/ICON.2012.6506561","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506561","url":null,"abstract":"The scheduling of real-time tasks on clusters is a critical issue for offering quality-of-service (QoS) assurance. A significant challenge in real-time task scheduling is to support various types of applications. In this paper we focus on the scheduling of bag-of-tasks (BoT) applications consisting of many independent tasks. BoT applications are a typically “embarrassingly parallel” type of applications which widely exist in various fields in science and engineering. We propose a dynamic (online) real-time scheduling algorithm referred to as scheduling algorithm with migration (SAM) for handling real-time BoT applications on cluster systems. SAM schedules tasks to the minimum number of processors so that computation power can be saved for unscheduled large tasks. SAM also utilizes task migration to optimize load balancing without undermining the schedulability of the tasks. Performance evaluation results are presented to demonstrate the effectiveness and competitiveness of our approaches when compared to existing algorithms.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"387 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126739361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Molecular communication model through gap junction channel with selective permeabilities 具有选择性渗透的间隙结通道的分子通信模型
2012 18th IEEE International Conference on Networks (ICON) Pub Date : 2012-12-01 DOI: 10.1109/ICON.2012.6506566
Yiqun Yang, C. Yeo
{"title":"Molecular communication model through gap junction channel with selective permeabilities","authors":"Yiqun Yang, C. Yeo","doi":"10.1109/ICON.2012.6506566","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506566","url":null,"abstract":"With rapid development in biological and nano areas, new communication methods promise novel solutions for various research issues. Due to the simple structure and the limited size of nanomachines, nanonetworks have conspicuous differences from traditional networks. Hence exploratory analysis and theory are expected. Molecular communication, which involves biological components in nanoscale, provides a more compatible approach to medical, environmental and agricultural research. Calcium ion (Ca2+), which is one of the most important universal second messengers in vivo cells, participates actively in the regulation of cellular activities. In this paper, we model the molecular communication system through gap junction channels. We present simulation results for patterned cells with different permeabilities. We analyze the propagation characteristics of intercellular calcium waves which are induced by the diffusion of inositol (l, 4, 5)-trisphosphate (IP3).","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126818959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distortion estimation for compressed video transmission over mobile networks 移动网络上压缩视频传输的失真估计
2012 18th IEEE International Conference on Networks (ICON) Pub Date : 2012-12-01 DOI: 10.1109/ICON.2012.6506583
Yu Wang, X. Jing, J. Y. Tham, W. S. Lee, K. Goh, Yao Zhao
{"title":"Distortion estimation for compressed video transmission over mobile networks","authors":"Yu Wang, X. Jing, J. Y. Tham, W. S. Lee, K. Goh, Yao Zhao","doi":"10.1109/ICON.2012.6506583","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506583","url":null,"abstract":"A compressed-domain distortion model is proposed for lossy transmission of compressed video. The model has low complexity and is suitable for real-time mobile applications, where resources are limited, to perform network resource allocation, performance control and system optimization. Simulation on various test sequences has demonstrated the robustness and accuracy of this model.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129929879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New developments in network forensics — Tools and techniques 网络取证的新发展-工具和技术
2012 18th IEEE International Conference on Networks (ICON) Pub Date : 1900-01-01 DOI: 10.1109/ICON.2012.6506587
R. Hunt
{"title":"New developments in network forensics — Tools and techniques","authors":"R. Hunt","doi":"10.1109/ICON.2012.6506587","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506587","url":null,"abstract":"Network forensics is a branch of digital forensics which has evolved recently as a very important discipline used in monitoring and analysing network traffic — particularly for the purposes of tracing intrusions and attacks. This paper presents an analysis of the tools and techniques used in network forensic analysis. It further examines the application of network forensics to vital areas such as malware and network attack detection; IP traceback and honeypots; and intrusion detection. Further, the paper addresses new and emerging areas of network forensic development which include critical infrastructure forensics, wireless network forensics, as well as its application to social networking.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114961416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Emerging Wireless Personal Area Networks (WPANs): — An analysis of techniques, tools and threats 新兴无线个人区域网络(wpan):技术、工具和威胁分析
2012 18th IEEE International Conference on Networks (ICON) Pub Date : 1900-01-01 DOI: 10.1109/ICON.2012.6506569
R. Hunt
{"title":"Emerging Wireless Personal Area Networks (WPANs): — An analysis of techniques, tools and threats","authors":"R. Hunt","doi":"10.1109/ICON.2012.6506569","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506569","url":null,"abstract":"Wireless Personal Area Networks provide a pivotal role in local area network technology complementing traditional Wireless Local Area Network technologies. Bluetooth, ZigBee and NFC (Near Field Communications) have emerged as key WPAN technologies with UWB (Ultra Wide Band) standards currently evolving. They are however subject to the usual range of security vulnerabilities found in wireless LANs such as spoofing, snooping, man-in-the-middle, denial of service and other attacks. However security in WPANs is not as mature as it is in Wireless LANs and further work is needed in order to provide comparable protection. This paper examines a range of WPAN technologies and security issues and proposes protection mechanisms that can mitigate risk in each case.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126567652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信