2006 8th International Conference Advanced Communication Technology最新文献

筛选
英文 中文
A dynamic state management algorithm for overloaded systems 超载系统的动态状态管理算法
2006 8th International Conference Advanced Communication Technology Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206038
Kyoung Seok Lee, B. Ryu, Cheol-Hoon Lee
{"title":"A dynamic state management algorithm for overloaded systems","authors":"Kyoung Seok Lee, B. Ryu, Cheol-Hoon Lee","doi":"10.1109/ICACT.2006.206038","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206038","url":null,"abstract":"The traffic state control scheme is a radio resource management (RRM) technique which optimizes the use of radio resources and reduces the mobile's power consumption. In this paper, we propose an efficient traffic state control scheme which is based on the three-state model. It exploits utilization of limited radio resources by dynamically switching mobile states. We evaluate the performance of traffic state control schemes on a packet based wireless OFDMA system. The simulation result shows that proposed scheme provides efficient resource allocation in overloaded system","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116914988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Unified Modeling Language-Based Modeling of GMPLS Networks 基于统一建模语言的GMPLS网络建模
2006 8th International Conference Advanced Communication Technology Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.205986
S. Misra, S. Misra, I. Woungang
{"title":"The Unified Modeling Language-Based Modeling of GMPLS Networks","authors":"S. Misra, S. Misra, I. Woungang","doi":"10.1109/ICACT.2006.205986","DOIUrl":"https://doi.org/10.1109/ICACT.2006.205986","url":null,"abstract":"We present a conceptual framework for modeling GMPLS-based networks and the solutions to their associated problems. The framework is targeted towards a larger scale initiative by us for designing a Unified Modeling Language (UML) Profile that can help with conceptual modeling of typical GMPLS network design problems. While there are pieces of literature available that describe profiles for other application areas, there are no profiles for use in networking problems, in general. Our work is an important step forward to address this deficiency","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117189481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High-speed attack mitigation engine by packet filtering and rate-limiting using FPGA 基于FPGA的包过滤和限速的高速攻击缓解引擎
2006 8th International Conference Advanced Communication Technology Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206058
Sang-Kil Park, J. Oh, Jongsoo Jang
{"title":"High-speed attack mitigation engine by packet filtering and rate-limiting using FPGA","authors":"Sang-Kil Park, J. Oh, Jongsoo Jang","doi":"10.1109/ICACT.2006.206058","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206058","url":null,"abstract":"Recently, enterprises, service provider, and e-businesses confront increasing security and performance challenges. Securing network, host, and on-line application is absolutely important. At the same time, security function must not disturb productivity. To ensure that increasing network traffic is safe and their networks are secure, these organizations must provide security with bias toward solutions that accommodate performance demands, while providing the security and networking features required to run their businesses. That is, best solutions are those that combine high performance with topnotch security. For satisfying those requirements, we have developed hardware based and high performance security gateway system (SGS) which providing security functions such firewall, IDS, rate-limiting, and traffic metering in wire speed. In this paper, we especially describe how H/W based firewall and rate-limiting and their response coordinating engine features are implemented in SGS as a hardware chipset (FPGA)","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117254546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The DLNA Proxy System Architecture for Sharing In-Home Media Contents via Internet 通过Internet共享家庭媒体内容的DLNA代理系统体系结构
2006 8th International Conference Advanced Communication Technology Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206353
Yeon-Joo Oh, Hoon-Ki Lee, J. Kim, Eui-Hyun H. Paik, Kwang-Roh Park
{"title":"The DLNA Proxy System Architecture for Sharing In-Home Media Contents via Internet","authors":"Yeon-Joo Oh, Hoon-Ki Lee, J. Kim, Eui-Hyun H. Paik, Kwang-Roh Park","doi":"10.1109/ICACT.2006.206353","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206353","url":null,"abstract":"This paper proposes a digital living network alliance (DLNA) proxy system, to provide services for accessing and sharing various DLNA-based media contents which are distributed over his/her or other's home facilities via home network or the Internet","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"25 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120849718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Impact of group mobility on ad hoc networks routing protocols 组移动性对ad hoc网络路由协议的影响
2006 8th International Conference Advanced Communication Technology Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206170
J. M. Ng, Yan Zhang
{"title":"Impact of group mobility on ad hoc networks routing protocols","authors":"J. M. Ng, Yan Zhang","doi":"10.1109/ICACT.2006.206170","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206170","url":null,"abstract":"Group communication has become increasingly important in mobile ad hoc networks. Effective support of group communication is essential for most ad hoc network applications where group communication is a crucial task. In mobile ad hoc network group communications, issues differ from those in wired networks because node mobility causes continuously changing topology in which routes break unpredictably and new routes form dynamically. Network partitioning and merging often occur in group movement scenarios such as in military operations, search and rescue operations etc. Based on these applications, we propose a novel group mobility model, called reference region group mobility (RRGM) model, to describe such group motion behaviors. By using the density-based approach, the size of the region covered by a group can be controlled. With the proposed model, we studied the impact of group formation and group partition on various ad hoc routing protocols. Furthermore, this model can be used in studying issues such as network partition prediction","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124088250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Throughput analysis of SR-ARQ scheme with adaptive packet length in slowly varying Rayleigh fading channel 慢变瑞利衰落信道中自适应包长SR-ARQ方案的吞吐量分析
2006 8th International Conference Advanced Communication Technology Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206162
D. Yang, W.C. Lee
{"title":"Throughput analysis of SR-ARQ scheme with adaptive packet length in slowly varying Rayleigh fading channel","authors":"D. Yang, W.C. Lee","doi":"10.1109/ICACT.2006.206162","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206162","url":null,"abstract":"In this paper, throughput efficiency of a selective repeat automatic repeat request (SR-ARQ) scheme with controllable packet length in Rayleigh fading channel is analyzed. The slowly Rayleigh fading channel is modeled to two Markov states with known transitional probabilities. Our system has four modes with known transition probabilities with which steady-state probabilities of each system mode can be calculated. With clear form of throughput efficiency, system performance can be directly evaluated so that time consuming simulation can be avoided. Throughput efficiencies in four simulation environments from former article are calculated to get numerical results which are considerably close to the former simulation results","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125934137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The system integration of DRM and fingerprinting 数字版权管理和指纹识别的系统集成
2006 8th International Conference Advanced Communication Technology Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206431
Jung-Soo Lee, K. Yoon
{"title":"The system integration of DRM and fingerprinting","authors":"Jung-Soo Lee, K. Yoon","doi":"10.1109/ICACT.2006.206431","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206431","url":null,"abstract":"In this paper, we propose the method of the integration between the DRM (digital rights management) system for the safe distribution of digital content and the fingerprinting system for the trace of the illegal distributor. DRM system is responsible for the safe distribution of the content, however, when an illegal distribution is happened, it can't trace the illegal distributor of the content. So we want to solve this problem through the integration between the DRM system and the fingerprinting system. We describe the condition that is needed in each system for integrating between the DRM and the fingerprinting. And we explain how both systems not only preserve each system's independence but also are effectively interlocked","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125952302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance comparisons of restoration techniques for fault management in OBS networks OBS网络故障管理恢复技术的性能比较
2006 8th International Conference Advanced Communication Technology Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206201
Y. M. Kim, Tae-hwa Kim, JungJoo Yoo, Byeong-Whi Kim, Hong-shik Park
{"title":"Performance comparisons of restoration techniques for fault management in OBS networks","authors":"Y. M. Kim, Tae-hwa Kim, JungJoo Yoo, Byeong-Whi Kim, Hong-shik Park","doi":"10.1109/ICACT.2006.206201","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206201","url":null,"abstract":"In this paper, we study recovery scheme for OBS networks and evaluate performance of recovery scheme through simulation using NS-2. Firstly, we change general restoration procedures proposed by Standard Organization with new restoration procedures considering characteristics of OBS networks. We named it original restoration scheme. Also, we propose a novel enhanced restoration scheme only adjusted to OBS networks. It gives us to reduce the recovery time. We then present performance of original restoration and enhanced restoration scheme using well-known performance metrics. The simulation results can verify that the enhanced restoration scheme has better performance than original restoration scheme","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127029069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An application level gateway for traversal of SIP transaction through NATs 用于通过nat遍历SIP事务的应用层网关
2006 8th International Conference Advanced Communication Technology Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206304
J. Han, Wook Hyun, Sun Ok Park, Il-Jin Lee, Miyoung Huh, Shin-Gak Kang
{"title":"An application level gateway for traversal of SIP transaction through NATs","authors":"J. Han, Wook Hyun, Sun Ok Park, Il-Jin Lee, Miyoung Huh, Shin-Gak Kang","doi":"10.1109/ICACT.2006.206304","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206304","url":null,"abstract":"SIP has been used to develop many kinds of SIP service, such as instant messaging, conference and presence, and these various services are being bundled to one application. NAT traversal has long been identified as a large problem when considered in the context of the session initiation protocol (SIP). The problem is further confused by the variety of NATs that are available in the market place today and the large number of potential deployment scenarios. In this paper, we suggest an ALG which operates inside NAT for traversal of SIP transactions","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128988665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Performance evaluation of software streaming server architecture for massive users 面向海量用户的软件流服务器架构性能评估
2006 8th International Conference Advanced Communication Technology Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206323
Sungjoo Kang, K. Ku, J. Shim, S. Hur, S. H. Ju, W. Choi
{"title":"Performance evaluation of software streaming server architecture for massive users","authors":"Sungjoo Kang, K. Ku, J. Shim, S. Hur, S. H. Ju, W. Choi","doi":"10.1109/ICACT.2006.206323","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206323","url":null,"abstract":"In this paper, we propose the streaming server architecture for massive users and verify it by a small scale simulation with virtual users. Software streaming is one of the ASP solution that allows the execution of stream-enabled software, even while the transmission of the program may still be in progress. In this paper, we analyze workload characteristics of the software stream, and extract four requirements that software streaming system have to satisfy. Based on these requirements, we design the software streaming server architecture. The verification of the designed server is performed by virtual user simulation. The result tells us the capacity of each server and helps us to calculate the scale of the system for massive users","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125673365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信