Future Generation Communication and Networking (FGCN 2007)最新文献

筛选
英文 中文
Which Trust Can Be Expected of the Common Criteria Certification at End-User Level? 通用标准认证在最终用户层面可获得何种信任?
Future Generation Communication and Networking (FGCN 2007) Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.235
D. Sauveron, P. Dusart
{"title":"Which Trust Can Be Expected of the Common Criteria Certification at End-User Level?","authors":"D. Sauveron, P. Dusart","doi":"10.1109/FGCN.2007.235","DOIUrl":"https://doi.org/10.1109/FGCN.2007.235","url":null,"abstract":"For the end-user of IT (information technologies) products, several questions exist about their real security. For instance, in the case of a smart card which is the more secure device in the collective mind, how to have confidence in a card bought anywhere ? How to be sure that the held cards have been subjected to security evaluation/certification processes and which level of trust could be expected? These questions can be shifted to the providers of secure IT solutions.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121014507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Supporting Multimedia Communication within an 802.11g Ad-hoc Network 在802.11g自组织网络中支持多媒体通信
Future Generation Communication and Networking (FGCN 2007) Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.208
Chung-wei Lee, Jonathan C. L. Liu, Kun Chen, Y. Tseng, Sheng-Po Kuo
{"title":"Supporting Multimedia Communication within an 802.11g Ad-hoc Network","authors":"Chung-wei Lee, Jonathan C. L. Liu, Kun Chen, Y. Tseng, Sheng-Po Kuo","doi":"10.1109/FGCN.2007.208","DOIUrl":"https://doi.org/10.1109/FGCN.2007.208","url":null,"abstract":"By investigating the experimental results of the average throughput with the 802.11g ad-hoc mode, we have collected the different performance characteristics among the indoor, the wall-penetration and the outdoor environment. Given the solid evidences from the baseline experiments, we have embedded the heuristic algorithms into the routing decisions. We have thus simulated a large area of 300 meters by 300 meters with hundreds of routing nodes. After investigating over 100 topology scenarios, the performance results indicate that our proposed scheme produces the higher-bandwidth paths for most of the cases. Even in the less-dense cases, our proposed schemes still can find the better paths with bandwidth about 30% higher than the conventional methods.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124911389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Time Reversal Based Time Division Duplex IDMA Communication System 一种基于时间反转的时分双工IDMA通信系统
Future Generation Communication and Networking (FGCN 2007) Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.47
T. Lan, Jianhao Hu, Xingzhong Xiong
{"title":"A Time Reversal Based Time Division Duplex IDMA Communication System","authors":"T. Lan, Jianhao Hu, Xingzhong Xiong","doi":"10.1109/FGCN.2007.47","DOIUrl":"https://doi.org/10.1109/FGCN.2007.47","url":null,"abstract":"In this paper, we propose a time reversal (TR) based time division duplex (TDD) interleave-division multiple access (IDMA) scheme (TDR-IDMA). Multiple user interference (MUI) can be greatly suppressed with TR technique. The Turbo-type iterative detection can achieve fast convergence speed with a little additional complexity at base station. From simulation results, we found that only five iterative processing can achieve acceptable performance for a length-16 repetition code. The single-path, multi-path and complex channel models are discussed in this paper.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125177924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Genetic Algorithm for RNG in the Crypto Module of Ubiquitous Computing Environment 泛在计算环境下密码模块中RNG的遗传算法
Future Generation Communication and Networking (FGCN 2007) Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.212
Jinkeun Hong, Kihong Kim
{"title":"The Genetic Algorithm for RNG in the Crypto Module of Ubiquitous Computing Environment","authors":"Jinkeun Hong, Kihong Kim","doi":"10.1109/FGCN.2007.212","DOIUrl":"https://doi.org/10.1109/FGCN.2007.212","url":null,"abstract":"Yet, it is quite difficult to create an unbiased and stable random bit stream, as required for statistical randomness, when using a random generator with only a hardware component and in especially it has occur the drift phenomena of input power. Therefore if the randomness of output bit stream is beyond limits range, it is applied the regulation of input power range to take the output bit stream, through the evaluation of randomness by constant period of output bit stream. Accordingly, this paper proposes a method for continuous stabilizing the input power of a random number generator using genetic algorithm mechanism in crypto module hardware. As such, the proposed scheme is designed to reduce the statistical property of a biased bit stream and optimize the input power using genetic algorithm to a random number generator engine in crypto module engine for ubiquitous computing.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123700843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cover Set Problem in Directional Sensor Networks 定向传感器网络中的覆盖集问题
Future Generation Communication and Networking (FGCN 2007) Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.94
Yanli Cai, W. Lou, Minglu Li
{"title":"Cover Set Problem in Directional Sensor Networks","authors":"Yanli Cai, W. Lou, Minglu Li","doi":"10.1109/FGCN.2007.94","DOIUrl":"https://doi.org/10.1109/FGCN.2007.94","url":null,"abstract":"A directional sensor network consists of a number of directional sensors, which can switch to several directions to extend their sensing ability to cover the interested targets in a given area. Because a directional sensor has a smaller angle of sensing range or even does not cover any target when it is deployed, how to cover the interested targets becomes a major problem in directional sensor networks. In this paper, we address the directional cover set problem (DCS) of finding a cover set in a directional sensor network, in which the directions cover all the targets. We propose both centralized and distributed algorithms for the DCS. We also introduce two applications that utilize these algorithms to extend the network work time while maximizing the coverage of the targets. Simulation results are presented to demonstrate the performance of these algorithms and the applications.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123735749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
A Performance Comparison of DS-CDMA and MC-CDMA with Per-User MMSE Frequency Domain Equalization 基于每用户MMSE频域均衡的DS-CDMA与MC-CDMA性能比较
Future Generation Communication and Networking (FGCN 2007) Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.30
T. Luo, Y. Guan, Gang Wu, Shaoqian Li, C. Law
{"title":"A Performance Comparison of DS-CDMA and MC-CDMA with Per-User MMSE Frequency Domain Equalization","authors":"T. Luo, Y. Guan, Gang Wu, Shaoqian Li, C. Law","doi":"10.1109/FGCN.2007.30","DOIUrl":"https://doi.org/10.1109/FGCN.2007.30","url":null,"abstract":"Direct sequence code-division multiple access (DS-CDMA) and multicarrier (MC-) CDMA are two important CDMA schemes for high rate wireless communication. A novel linear per user minimum mean square error (PU-MMSE) detection technique for DS-CDMA with frequency domain equalization (FDE) based on the MMSE criterion applied per user is presented. It is shown by computer simulation that PU-MMSE outperforms conventional per carrier (PC-) MMSE for DS-CDMA with FDE in frequency selective block fading channel. The performance of DS-CDMA with PU-MMSE FDE can be further promoted by successive interference cancellation (SIC). Comparing to MC-CDMA with PU-MMSE FDE, DS-CDMA with PU-MMSE FDE has no performance loss and has much lower peak-to-average power ratio (PAPR).","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123762941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Signal Parameter Extraction via Component Cancellation Using Evolutionary Programming 基于进化规划的分量抵消信号参数提取
Future Generation Communication and Networking (FGCN 2007) Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.200
I. Choi, Ill-Keun Rhee, Young-Hoon Lee
{"title":"Signal Parameter Extraction via Component Cancellation Using Evolutionary Programming","authors":"I. Choi, Ill-Keun Rhee, Young-Hoon Lee","doi":"10.1109/FGCN.2007.200","DOIUrl":"https://doi.org/10.1109/FGCN.2007.200","url":null,"abstract":"In this paper, a novel direction of arrival (DOA) estimation scheme is proposed. The proposed algorithm, called the signal parameter extraction via component cancellation (SPECC), is an evolutionary optimization-based method and extracts the amplitudes of signal sources and DOA impinging on a sensor array in a step-by-step procedure, different from other algorithms such as MUSIC, root-MUSIC, ESPRIT, etc., which extract those parameters at the same time. Our algorithm has robustness to noise and high resolution in DOA estimation. In the simulation, comparisons with root-MUSIC, which has been known as one of the best algorithms, are presented to illustrate the superiority of the proposed SPECC algorithm.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122804836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Method for Determination of Key Distribution Period Using QoS Function 一种利用QoS函数确定密钥分发周期的方法
Future Generation Communication and Networking (FGCN 2007) Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.17
D. Kang, Hak-Man Kim
{"title":"A Method for Determination of Key Distribution Period Using QoS Function","authors":"D. Kang, Hak-Man Kim","doi":"10.1109/FGCN.2007.17","DOIUrl":"https://doi.org/10.1109/FGCN.2007.17","url":null,"abstract":"The integration of the SCADA network into IT networks is progressing in the context of automation and economics of power system, which makes the SCADA network of power system also revealed to increased cyber attacks. Considering this situation, SCADA network is also required to be secured like any other communication network. There are several ways of cyber security, but we consider the encryption of information on SCADA network in this paper. Encryption makes additional load on network traffic while it improves the security of network. We propose a method for balancing the security with the network performance.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125687666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Grid Security Interoperation between CGSP and VEGA CGSP与VEGA的网格安全互操作
Future Generation Communication and Networking (FGCN 2007) Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.142
Deqing Zou, Hai Jin, Xueguang Chen, Zongfen Han
{"title":"Grid Security Interoperation between CGSP and VEGA","authors":"Deqing Zou, Hai Jin, Xueguang Chen, Zongfen Han","doi":"10.1109/FGCN.2007.142","DOIUrl":"https://doi.org/10.1109/FGCN.2007.142","url":null,"abstract":"Grid computing emerges as an effective technology to couple geographically distributed resources and solve large-scale computational problems in wide area networks. There are several popular grid platforms, such as UNICORE and Globus Toolkit. Many famous grid projects are constructed with these platforms, each of which manages different distributed resources. In order to aggregate resources managed by different grid platforms, it is necessary to implement the interoperation among these grid platforms. Security interoperation is one of key issues for the interoperation. CGSP (ChinaGrid Support Platform) and VEGA are two popular grid platforms in China. To achieve security interoperation between these two platforms, four mapping policies, including user-user mapping, user-agora mapping, role-user mapping, role-agora mapping, are proposed in this paper. The security interoperation process is proposed based on SAML specification and the mapping policies. We also analyze the flexibility of mapping policies and the security of the interoperation process.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134603962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Distributed Video Surveillance System Based on Overlay Network 基于覆盖网络的分布式视频监控系统
Future Generation Communication and Networking (FGCN 2007) Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.107
Xuesong Cao, Zhaoping Wang, Ruimin Hu, Jun Chen
{"title":"Distributed Video Surveillance System Based on Overlay Network","authors":"Xuesong Cao, Zhaoping Wang, Ruimin Hu, Jun Chen","doi":"10.1109/FGCN.2007.107","DOIUrl":"https://doi.org/10.1109/FGCN.2007.107","url":null,"abstract":"A novel distributed video surveillance system, called as E-touch is presented in this paper. The system provides a three-layers model based on overlay network. In the middle layer of the model, overlay service network layer (OSNL) is composed of many intelligent overlay nodes mapped by underlying network. Overlay nodes provide all kinds of media service for upper surveillance application. OSNL allows service composition of distributed stream processing applications dynamically. And a load balance of QoS-aware service composition algorithm (LBQSC) is employed to satisfy their end-to-end QoS demands. Large-scale experimental results demonstrate the scalability, efficiency and performance of the E-touch system.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133301118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信