2010 Second International Conference on Communication Software and Networks最新文献

筛选
英文 中文
A New Strategy of Resource Searching in Unstructured P2P Network 一种新的非结构化P2P网络资源搜索策略
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.120
Jianyong Wang, Yuling Li, Futing Gong, Wei Chen
{"title":"A New Strategy of Resource Searching in Unstructured P2P Network","authors":"Jianyong Wang, Yuling Li, Futing Gong, Wei Chen","doi":"10.1109/ICCSN.2010.120","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.120","url":null,"abstract":"In the unstructured P2P networks, the flooding resource search method may cause much communication overhead, and severely constrains the scalability of network. In order to overcome this disadvantage, a new search strategy named TTL-Search based on the local caching and the scope of searching requests is proposed in this paper. According to this strategy, the searching process is divided into two stages, and each stage adopts different forwarding strategies. Analysis and experimental results show that, TTL-Search can overcome blindness of flooding search, and also can reduce redundancy overhead caused by query to some extend. So it can improve query success rate, and can be efficiently applied in the unstructured P2P network searching.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134007272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Index Correlation Adjustment Based on Orthogonalization for Network Damage Assessment 基于正交化的网络损害评估指标相关性平差
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.110
Xing Wang, Binxing Fang, Hong-li Zhang, Hui He, Gang Xu
{"title":"Index Correlation Adjustment Based on Orthogonalization for Network Damage Assessment","authors":"Xing Wang, Binxing Fang, Hong-li Zhang, Hui He, Gang Xu","doi":"10.1109/ICCSN.2010.110","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.110","url":null,"abstract":"Existing network damage assessment method fall short because they either lack correlation adjustment among indexes or without conclusive evidence to demonstrated the degree does represent the real situation of the network. This paper proposed a method to adjustment index correlation based on Orthogonalization. The advantages of this method for evaluation damage degree of network have been demonstrated from two simulation experiments. One is damage degree comparisons in difference basic topologies. Another is worm propagation in campus topology. The results show that network suffered by distinct damage with the same packet creation rate and traffic generate model in different basic topologies. The worm propagation experiment has demonstrated that the method can reflected the dynamic process of network availability damage accurately and integrally.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"57 42","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134225561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Peak to Average Power Ratio Analysis for LTE Systems LTE系统的峰值平均功率比分析
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.53
M. Rana, M. S. Islam, A. Kouzani
{"title":"Peak to Average Power Ratio Analysis for LTE Systems","authors":"M. Rana, M. S. Islam, A. Kouzani","doi":"10.1109/ICCSN.2010.53","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.53","url":null,"abstract":"The 3rd generation partnership project (3GPP) long term evolution (LTE) standard uses single carrier frequency division multiple access (SCFDMA) scheme for the uplink transmissions and orthogonal frequency division multiplexing access (OFDMA) in downlink. SCFDMA uses DFT spreading prior to OFDMA modulation to map the signal from each user to a subset of the available subcarriers i.e., single carrier modulation. The efficiency of a power amplifier is determined by the peak to average power ratio (PAPR) of the modulated signal. In this paper, we analyze the PAPR in 3GPP LTE systems using root raised cosine based filter. Simulation results show that the SCFDMA subcarrier mapping has a significantly lower PAPR compared to OFDMA. Also comparing the three forms of SCFDMA subcarrier mapping, results show that interleave FDMA (IFDMA) subcarrier mapping with proposed root raised cosine filter reduced PAPR significantly than localized FDMA (LFDMA) and distributed (DFDMA) mapping. This improves its radio frequency (RF) power amplifier efficiency and also the mean power output from a battery driven mobile terminal.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115120683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
A Comparative Study of Six Software Packages for Complex Network Research 复杂网络研究中六种软件包的比较研究
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.34
Kaikuo Xu, Changjie Tang, Rong Tang, G. Ali, Jun Zhu
{"title":"A Comparative Study of Six Software Packages for Complex Network Research","authors":"Kaikuo Xu, Changjie Tang, Rong Tang, G. Ali, Jun Zhu","doi":"10.1109/ICCSN.2010.34","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.34","url":null,"abstract":"UCINET, Pajek, Networkx, iGraph, JUNG and statnet, are commonly used to perform analysis with complex network model. The scalability, and function coverage of these six software packages are assessed and compared. Some randomly generated datasets are used to evaluate the performance of these software packages with regard to input/output (I/O), basic graph algorithms, statistical metrics computation, graph generation, community detection, and visualization. A metric regarding both numbers of the nodes and the edges of complex networks, which is called Maximum Expected Network Processing Ability (MENPA), is proposed to measure the scalability of software packages. Empirical results show that these six software packages are complementary rather than competitive and the difference on the scalability among these six software packages may be attributed to the varieties in both of the programming languages and the network representations.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129809724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Decentralized Multi-group Communication Protocol Supporting Causal Order 支持因果顺序的分散多组通信协议
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.47
Chayoung Kim, Jinho Ahn
{"title":"Decentralized Multi-group Communication Protocol Supporting Causal Order","authors":"Chayoung Kim, Jinho Ahn","doi":"10.1109/ICCSN.2010.47","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.47","url":null,"abstract":"Previous gossip-based protocols developed for sensor networks or various kinds of P2P networks assume that all processes in a system are interested in all events occurring while communicating among them. Though all query nodes in a large group are running the same application, they might join various multicast groups depending on their interests. However, despite the significant importance of message delivery order guarantees, little work on gossip-based protocols exists supporting multicast groups and satisfying these constraints in a scalable way. In this paper, we present an efficient and scalable causal order guaranteeing multicast protocol to use only local views supporting multi-groups. In the proposed protocol, multicast groups are defined by interests associated with the processes and join/leave messages are disseminated by gossip communication based on local views. So, group memberships are dynamically changing by their own members in multicast groups with high probabilistic reliability. Also, group ID order lists are delivered to possibly overlapping multicast groups to ensure causal order delivery. Therefore, these features of the protocol might result in its very low view management cost compared with the cost incurred by maintaining hierarchical member list for delegate groups in the previous protocols.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128881091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on Degree Control Resistance to Frangibility of Scale-Free Networks 无标度网络抗脆弱性度控制研究
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.59
Jingju Gao, Yongwei Meng
{"title":"Research on Degree Control Resistance to Frangibility of Scale-Free Networks","authors":"Jingju Gao, Yongwei Meng","doi":"10.1109/ICCSN.2010.59","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.59","url":null,"abstract":"Since the small-world effect and the scale-free characteristic discovery, the research of complex network obtained rapidly development in the past several years, the complex networks’ anti-frangibility is one of research focal points. This article analysised the scale-free networks’ frangibility, and obtained that the scale-free networks’ frangibility is mainly caused by combining attack to the hubs. From the two aspects of minimum degree and hubs, through setting maximum degree and minimum degree to control the hubs and the stochastic production connections separately, established the scale-free networks’ anti-frangibity model based on this. The simulation experiment indicated that through setting the minimum degree and controlling to hubs, can strengthen the scale-free networks’ anti-rangibility ability","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130712451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Modulation Classification of MQAM Signals Using Joint Moments 基于关节矩的MQAM信号调制分类研究
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.32
Ning An, Bingbing Li, M. Huang
{"title":"Research on Modulation Classification of MQAM Signals Using Joint Moments","authors":"Ning An, Bingbing Li, M. Huang","doi":"10.1109/ICCSN.2010.32","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.32","url":null,"abstract":"Automatic modulation classification (AMC) is a scheme to identify the data samples automatically. Usually, in wireless communication, especially through the Rayleigh fading channel, AMC performance will severe degrade. This paper presents a new method for AMC, using a modified Joint Power Estimation and modulation types of the transmitted signals by observing the receive Modulation Classification (JPEMC) algorithm. The advantage of our new algorithm is we don’t need the channel information as a priori. The Monte Carlo simulation shows that the performance of our algorithm can be better than the existing AMC algorithms.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130973991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Preventing of SYN Flood Attack with Iptables Firewall Iptables防火墙防范SYN Flood攻击
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.74
Sara Mirzaie, Alireza Karimi Elyato, M. Sarram
{"title":"Preventing of SYN Flood Attack with Iptables Firewall","authors":"Sara Mirzaie, Alireza Karimi Elyato, M. Sarram","doi":"10.1109/ICCSN.2010.74","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.74","url":null,"abstract":"Denial of services attacks prevents legitimate users from using a service. One particular type of this attack is known as SYN flood, where external hosts attempt to overwhelm the server machine by sending a constant stream of TCP connection request. There are several approaches for dealing with this attack that firewall is one of them. In this paper we attempt to prevent of this attack with iptables firewalls.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131699913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Dynamic Privacy Management in Ubiquitous Computing Environments 泛在计算环境下的动态隐私管理
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.122
Jiho Kim, Jungyu Lee, Soonhyung Park, Ohyoung Song
{"title":"Dynamic Privacy Management in Ubiquitous Computing Environments","authors":"Jiho Kim, Jungyu Lee, Soonhyung Park, Ohyoung Song","doi":"10.1109/ICCSN.2010.122","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.122","url":null,"abstract":"Ubiquitous computing environment pursues context-aware in order words personalized service by collecting contexts through sensors located over wide area and presenting the service automatically depending not on the user’s request but on the situations that are needed. But in order to provide the personalized service, contexts collected through various sensors are needed and they include private information. Therefore, it is important to keep a balance between the convenience by presenting service and protecting private information. In this paper, we classify and grade user’s various contexts requested in ubiquitous computing environment. Based on these, we make decisions on whether to present the service or not by profile-matching between user profile and privacy requirements for providing service.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"2008 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125583436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research of Web Service Based on P2P 基于P2P的Web服务研究
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.24
Baohua Jin, Dongyao Zou
{"title":"Research of Web Service Based on P2P","authors":"Baohua Jin, Dongyao Zou","doi":"10.1109/ICCSN.2010.24","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.24","url":null,"abstract":"This paper presents a brief introduction to Web Service and P2P technology and analyzes their advantages and disadvantages, and gets the conclusion that P2P computing platform based Web Service is an ideal Web Service implementation. The cost of establishment and maintenance of system will reduce after adopting the service integration and resource autonomy of P2P. A P2P based Web Service architecture is proposed and the working mechanism is designed in the paper. This architecture can not only provide Web Service efficiently but also guarantee the robust system.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"637 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122952397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信