2012 IEEE 11th International Symposium on Network Computing and Applications最新文献

筛选
英文 中文
Interest-Centric Mobile Ad Hoc Networks 以兴趣为中心的移动自组织网络
Renato C. Dutra, Heberte F. Moraes, C. Amorim
{"title":"Interest-Centric Mobile Ad Hoc Networks","authors":"Renato C. Dutra, Heberte F. Moraes, C. Amorim","doi":"10.1109/NCA.2012.32","DOIUrl":"https://doi.org/10.1109/NCA.2012.32","url":null,"abstract":"Mobile ad hoc Networks (MANETs) pose significant shared communication medium constraints such as finite memory, number of access channels, and bandwidth to the development of effective communication protocols. Furthermore, multihop message forwarding multiplies the amount of simultaneous transmissions, which augment both channel contention and network congestion, increasing interference and reducing protocol performance. With these issues in mind, we propose a variation of MANET which we called interest-centric mobile adhoc network or simply Radnet in which every participant node implements in the network layer an Active Prefix (AP) composed of a prefix and an application interest, which the Radnet protocol uses for node identification, message addressing, probabilistic message forwarding, and name search in a distributed way. To evaluate the effectiveness of Radnets for generating lower disturbance in the shared communication medium, thus enabling resource savings, and reducing message overheads, we compared the simulated performances of Radnet protocol (RP) against those of AODV and AODV + Gossip3 (G3AODV) protocols. The results showed that RP achieved a 16 percent higher message delivery rate and one order of magnitude lower latency and message overhead for short 0.5 kB messages in scenarios with 150 mobile nodes. For 5 kB messages, however, AODV and G3AODV rarely ran until the end, due to their overwhelming message overheads, while Radnet protocol showed performances similar to that of the short message case. To evaluate the use of Radnets in practice, we ran experiments in the laboratory, including a chat application on a 20-node Radnet.","PeriodicalId":242424,"journal":{"name":"2012 IEEE 11th International Symposium on Network Computing and Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129478420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Chasing the Weakest Failure Detector for k-Set Agreement in Message-Passing Systems 消息传递系统中k-Set协议的最弱故障检测器
A. Mostéfaoui, M. Raynal, J. Stainer
{"title":"Chasing the Weakest Failure Detector for k-Set Agreement in Message-Passing Systems","authors":"A. Mostéfaoui, M. Raynal, J. Stainer","doi":"10.1109/NCA.2012.19","DOIUrl":"https://doi.org/10.1109/NCA.2012.19","url":null,"abstract":"This paper continues our quest for the weakest failure detector which allows the k-set agreement problem to be solved in asynchronous message-passing systems prone to process failures. It has two main contributions which will be instrumental to complete this quest. The first contribution is a new failure detector (denoted PiSigma(x, y)) that has several noteworthy properties. (a) It is stronger than Sigma(k) which has been shown to be necessary. (b) It is equivalent to the pair (Sigma, Omega) when x=y=1 (optimal to solve consensus). (c) It is equivalent to the pair (Sigma(n-1), Omega(n-1)) when x=y=n-1 (optimal for (n-1)-set agreement). (d) It is strictly weaker than the pair (Sigma(x), anti-Omega(y)) (which has been investigated in previous works). (e) It is operational: the paper presents a PiSigma(x, y)-based algorithm that solves k-set agreement for k greater or equal to xy (intuitively, x refers to the maximum number of isolated groups of processes and y to the number of leaders in each of these groups). The second contribution of the paper is a proof that, for k strictly between 1 and n-1, the eventual leaders failure detector Omega(k) (which eventually provides each process with the same set of k process identities, this set including at least one correct process) is not necessary to solve k-set agreement problem.","PeriodicalId":242424,"journal":{"name":"2012 IEEE 11th International Symposium on Network Computing and Applications","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131381668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Information Divergence Estimation over Data Streams 基于数据流的信息散度估计
E. Anceaume, Yann Busnel
{"title":"An Information Divergence Estimation over Data Streams","authors":"E. Anceaume, Yann Busnel","doi":"10.1109/NCA.2012.16","DOIUrl":"https://doi.org/10.1109/NCA.2012.16","url":null,"abstract":"In this paper, we consider the setting of large scale distributed systems, in which each node needs to quickly process a huge amount of data received in the form of a stream that may have been tampered with by an adversary. In this situation, a fundamental problem is how to detect and quantify the amount of work performed by the adversary. To address this issue, we have proposed in a prior work, AnKLe, a one pass algorithm for estimating the Kullback-Leibler divergence of an observed stream compared to the expected one. Experimental evaluations have shown that the estimation provided by AnKLe is accurate for different adversarial settings for which the quality of other methods dramatically decreases. In the present paper, considering n as the number of distinct data items in a stream, we show that AnKLe is an (ε, δ)-approximation algorithm with a space complexity Õ(1/ε + 1/ε2) bits in “most” cases, and Õ(1/ε + n-ε-1/ε2 ) otherwise. To the best of our knowledge, an approximation algorithm for estimating the Kullback-Leibler divergence has never been analyzed before.","PeriodicalId":242424,"journal":{"name":"2012 IEEE 11th International Symposium on Network Computing and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114897276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Internet Distance Prediction Using Node-Pair Geography 基于节点对地理的互联网距离预测
Ankur Jain, J. Pasquale
{"title":"Internet Distance Prediction Using Node-Pair Geography","authors":"Ankur Jain, J. Pasquale","doi":"10.1109/NCA.2012.12","DOIUrl":"https://doi.org/10.1109/NCA.2012.12","url":null,"abstract":"Predictive methods for learning network distances are often more desirable than direct performance measurements between end hosts. Yet, predicting network distances remains an open and difficult problem, as the results from a number of comparative and analytical studies have shown. From an application requirements perspective, there is significant room for improvement in achieving prediction accuracies at a satisfactory level. In this paper, we develop and analyze a new, machine learning-based approach to distance prediction that seeks to capture and generalize geographical characteristics between Internet node pairs, instead of relying on direct and ongoing measurements of partial paths. We apply a basic algorithm in machine learning to demonstrate this idea and highlight the potential benefits that this method may offer over other popular methods that exist today.","PeriodicalId":242424,"journal":{"name":"2012 IEEE 11th International Symposium on Network Computing and Applications","volume":"39 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115564107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Proximity Detection and Message Exchange in WLANs 无线局域网中的接近检测和消息交换
S. Schnaufer, J. Kiess, Hendrik Lemelson, S. Kopf, Sebastian Geiger, W. Effelsberg
{"title":"Proximity Detection and Message Exchange in WLANs","authors":"S. Schnaufer, J. Kiess, Hendrik Lemelson, S. Kopf, Sebastian Geiger, W. Effelsberg","doi":"10.1109/NCA.2012.31","DOIUrl":"https://doi.org/10.1109/NCA.2012.31","url":null,"abstract":"We present a novel system that allows small handheld devices to detect other devices in the local proximity and to exchange messages with them. The client devices use WLAN to access the system via a web interface and do not require additional software or modification of the device's operating system. The physical closeness of client devices is estimated based on their signal strengths measured by the system's access points. A major advantage compared to indoor positioning systems is the fact that our system does not require a training phase. We conduct a comprehensive evaluation to demonstrate the practicability of our approach.","PeriodicalId":242424,"journal":{"name":"2012 IEEE 11th International Symposium on Network Computing and Applications","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122971039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Technique for Self-Optimizing Scalable and Dependable Server Clusters under QoS Constraints QoS约束下可扩展可靠服务器集群的自优化技术
R. M. Llamas, D. García, J. Entrialgo
{"title":"A Technique for Self-Optimizing Scalable and Dependable Server Clusters under QoS Constraints","authors":"R. M. Llamas, D. García, J. Entrialgo","doi":"10.1109/NCA.2012.29","DOIUrl":"https://doi.org/10.1109/NCA.2012.29","url":null,"abstract":"Cluster management has become a multi objective task that involves many disciplines like power optimization, fault tolerance, dependability and online system operation analysis. Efficient and secure operation of these clusters is a key objective of any data center policy. In addition, the service provided by these servers must fulfill a level of quality of service (QoS) to the customers. Applying self-management techniques to these clusters would simplify and automate its operation. Current self-management techniques that take into account service level agreements (SLAs) do not cover at the same time the two most important sides of the cluster operation: self-optimization, for an efficient and profitable operation, and self-healing, for a secure operation and high level of quality of service perceived by users. This work integrates a self-optimization strategy for Internet server clusters that optimizes the power consumption, using dynamic provisioning of servers, with a self-healing strategy that improves the reaction of the cluster to a server failure, by using the spare capacity of the cluster intelligently. The self-management technique is based on empirical response time and power consumption models of the servers that simplify its operation. Additionally, the technique presented in this paper guarantees the fulfillment of the SLA.","PeriodicalId":242424,"journal":{"name":"2012 IEEE 11th International Symposium on Network Computing and Applications","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127141979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Machine Learning Methodology for Enhancing Automated Process in IT Incident Management 增强IT事件管理自动化过程的机器学习方法
Haochen Li, Zhiqiang Zhan
{"title":"Machine Learning Methodology for Enhancing Automated Process in IT Incident Management","authors":"Haochen Li, Zhiqiang Zhan","doi":"10.1109/NCA.2012.28","DOIUrl":"https://doi.org/10.1109/NCA.2012.28","url":null,"abstract":"Operating system experienced a rise in number of incidents in recent years. Analysis and reemployment of past solution therefore may make a contribution in reducing service interrupt time and minimizing business losses. The training and retaining of human resources is another primary disbursement source for enterprise. Thus, it is of great significance for enterprises to find reasonable solutions automatically. Combined with keyword tokenization, data mining, numerical optimization and neural network, this paper presents a system that compares and finds the most similar incident solution in the past, based on the description provided by customers in natural language. We try to improve the automated process by increasing the efficiency and accuracy through machine learning methodology and also devote to presenting a practical decision support method.","PeriodicalId":242424,"journal":{"name":"2012 IEEE 11th International Symposium on Network Computing and Applications","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127373419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Application of Regenerating Codes for Fault Tolerance in Distributed Storage Systems 再生码在分布式存储系统容错中的应用
K. Peter, P. Sobe
{"title":"Application of Regenerating Codes for Fault Tolerance in Distributed Storage Systems","authors":"K. Peter, P. Sobe","doi":"10.1109/NCA.2012.35","DOIUrl":"https://doi.org/10.1109/NCA.2012.35","url":null,"abstract":"Recently, regenerating codes, a special network coding technique, were discovered for fault-tolerant storage systems with the promising advantage of efficient data recovery in the case of a single node failure and replacement (regeneration case). From the perspective of coding theory, regenerating codes are extensively studied, but there exists no reference on how to implement these codes in storage systems. We provide a comparison of Reed-Solomon codes and regenerating codes from an implementation point of view. The comparison includes the experimental evaluation of the encoding and the regeneration data throughput.","PeriodicalId":242424,"journal":{"name":"2012 IEEE 11th International Symposium on Network Computing and Applications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114706670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multi-fence Countermeasure Based Inter-domain Source Address Validation Method 基于多围栏对抗的域间源地址验证方法
Jie Li, J. Bi, Jianping Wu, Wei Zhang
{"title":"A Multi-fence Countermeasure Based Inter-domain Source Address Validation Method","authors":"Jie Li, J. Bi, Jianping Wu, Wei Zhang","doi":"10.1109/NCA.2012.20","DOIUrl":"https://doi.org/10.1109/NCA.2012.20","url":null,"abstract":"The functional deficiency of the Internet architecture enables attackers the ability to easily to spoof IP source address. The traditional signature-and-verification based anti-spoofing methods are often limited by essential process based on an explicit analysis and process of the IP header and does not adapt to incremental deployment. This paper designs a multi-fence countermeasure based inter-domain source address validation method named VIP. By employing intelligent originating information label and extended MPLS based cloud and network, VIP enables lightweight-label-based packet forwarding and validation. And VIP offers gains in efficiency by reducing the load on both forwarding tables and validation processing without negative influences and complex operations on de facto networks. In addition to enhanced scalability, VIP may facilitate incremental deployment in the long run.","PeriodicalId":242424,"journal":{"name":"2012 IEEE 11th International Symposium on Network Computing and Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127075276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Delay-Aware Query Routing Tree for Wireless Sensor Networks 无线传感器网络延迟感知查询路由树
Shaila Pervin, J. Kamruzzaman, G. Karmakar
{"title":"Delay-Aware Query Routing Tree for Wireless Sensor Networks","authors":"Shaila Pervin, J. Kamruzzaman, G. Karmakar","doi":"10.1109/NCA.2012.39","DOIUrl":"https://doi.org/10.1109/NCA.2012.39","url":null,"abstract":"Timeliness in query response is the major quality metric for query processing in the real-time applications of Wireless Sensor Networks (WSNs). The structure of the query routing tree directly affects the whole query processing delay as it provides the path to forward a query to the relevant nodes and return the response to the sink. In the current literature, query routing structure is designed irrespective of the variation in query loads among the sensors. As a consequence, current schemes do not guarantee for the routing tree to provide a faster path to the sensors with higher query load. This motivates the current work to consider query load in constructing and self-reconfiguring the routing tree. In this paper, we present a query load-based spanning tree construction method that reduces the query response delay as well as energy consumption in query execution and provides query response with the best possible accuracy. Simulation results illustrate the efficacy of the proposed framework.","PeriodicalId":242424,"journal":{"name":"2012 IEEE 11th International Symposium on Network Computing and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114495547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信