2009 Eighth International Conference on Networks最新文献

筛选
英文 中文
Designing and Implementing an Embedded Linux for Limited Resource Devices 有限资源设备嵌入式Linux系统的设计与实现
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.27
H. Lyytinen, Keijo Haataja, Pekka J. Toivanen
{"title":"Designing and Implementing an Embedded Linux for Limited Resource Devices","authors":"H. Lyytinen, Keijo Haataja, Pekka J. Toivanen","doi":"10.1109/ICN.2009.27","DOIUrl":"https://doi.org/10.1109/ICN.2009.27","url":null,"abstract":"In this paper, the implementation details of an embedded Linux for limited resource devices are provided. Due to lack of an actual hardware to test the implemented embedded Linux, a simulator for development work had to be built. Thus, the implementation details of the simulator as well as an analysis of simulation results are described. Moreover, some new ideas that will be used in our future research work are proposed.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134464891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using Monte Carlo Simulation in Grid Computing Systems for Reliability Estimation 蒙特卡罗仿真在网格计算系统可靠性估计中的应用
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.60
Ehsan Gholami, A. Rahmani, A. Navin
{"title":"Using Monte Carlo Simulation in Grid Computing Systems for Reliability Estimation","authors":"Ehsan Gholami, A. Rahmani, A. Navin","doi":"10.1109/ICN.2009.60","DOIUrl":"https://doi.org/10.1109/ICN.2009.60","url":null,"abstract":"Grid Computing Systems (GCS) have been suggested as an effective technology in geographically distributed resource coupling for applications that require large space for computations and resources. Reliability has proved to be one of the most important criteria in grid systems. In such systems, dynamic access to the required resources is complex, and therefore achieving reliability tends to be very difficult. In this paper we propose an algorithm to estimating reliability of programs and grid system based on Monte Carlo simulation. Our suggested algorithm considers the transmission rate of data between nodes through links and processing time on nodes to estimate the reliability of involved nodes and links which requires less time and complexity for running and it is appropriate for GCS.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122534574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design and Validation of an Analytical Model to Evaluate Monitoring Frameworks Limits 评估监测框架限制的分析模型的设计与验证
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.42
Abdelkader Lahmadi, Laurent Andrey, O. Festor
{"title":"Design and Validation of an Analytical Model to Evaluate Monitoring Frameworks Limits","authors":"Abdelkader Lahmadi, Laurent Andrey, O. Festor","doi":"10.1109/ICN.2009.42","DOIUrl":"https://doi.org/10.1109/ICN.2009.42","url":null,"abstract":"It is  essential that  a  monitoring  system is  being designed   with performance and  scalability  in mind.   But due  to the diversity and complexity  of both the  monitoring and  the  monitored systems, it is currently difficult to    reason on both   performance and scalability using  ad hoc   techniques.  Thus, both   simulation  is required  and analytical models based   on   well established  techniques  such    as queueing theory have to be developed. In  this paper we provide an analytical    modeling of  the     behavior  of  the    commonly used manager-agent   monitoring frameworks   within  two scenarios:  single manager-single agent  and   single manager-multiple agents.   The two designed   models  enable the  automation  of   the estimation of  the scalability limit  of the two types  of management  monitoring schemes regarding a performance metric like the monitoring delay.  We validate our developed  models  through simulation  based on  parameters values obtained from the performance measurement  of a life running JMX-based monitoring applications with the two scenarios.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133157036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Cloud Computing Based Real Time Financial System 基于云计算的实时金融系统
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.71
G. Fenu, S. Surcis
{"title":"A Cloud Computing Based Real Time Financial System","authors":"G. Fenu, S. Surcis","doi":"10.1109/ICN.2009.71","DOIUrl":"https://doi.org/10.1109/ICN.2009.71","url":null,"abstract":"The “Cloud Computing” is becoming an increasingly popular term. The new “XaaS” category of services introduced will slowly replace many types of computational resources currently used. In this perspective, grid computing, the basic element for the large scale supply of cloud services, will play a fundamental role in defining how those services will be provided. This paper is concerned with the study and preliminary design of a real time financial system based on cloud computing technologies that enable macroeconomic analysis and forecasts of the financial markets and their instruments. Cloud and Grid paradigms can generate different added values which are examined in detail in the paper. This work utilises the results obtained during the Cybersar Project managed by the COSMOLAB Consortium (Italy). The system analyzed and described herein will be implemented in the Cybersar Computational Grid by autumn 2009.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129168626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Specifications of Secure and Safe Embedded System Networks 安全嵌入式系统网络规范
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.14
M. Svéda, R. Vrba
{"title":"Specifications of Secure and Safe Embedded System Networks","authors":"M. Svéda, R. Vrba","doi":"10.1109/ICN.2009.14","DOIUrl":"https://doi.org/10.1109/ICN.2009.14","url":null,"abstract":"The paper focuses on behavioral specifications of reactive and real-time activities of embedded system networks utilizing either structured or object-oriented approach depending on application design requirements. The design stemming from such requirements can eliminate not only behavioral and structural faults but also security and safety flaws caused by design errors. Reflecting current trends in system and software engineering, this contribution presents executable specifications and rapid prototyping using Asynchronous Specification Language for structured design, and object specifications and verifications using Class Specification Language for object-oriented design of embedded system network applications.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127222823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Automotive Security System for Anti-theft 一种汽车防盗系统
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.28
Huaqun Guo, H. S. Cheng, Yongdong Wu, J. J. Ang, F. Tao, A. Venkatasubramanian, C. H. Kwek, L. H. Liow
{"title":"An Automotive Security System for Anti-theft","authors":"Huaqun Guo, H. S. Cheng, Yongdong Wu, J. J. Ang, F. Tao, A. Venkatasubramanian, C. H. Kwek, L. H. Liow","doi":"10.1109/ICN.2009.28","DOIUrl":"https://doi.org/10.1109/ICN.2009.28","url":null,"abstract":"Automotive theft has been a persisting problem around the world and greater challenge comes from professional thieves. In this paper, we present an automotive security system to disable an automobile and its key auto systems through remote control when it is stolen. It hence deters thieves from committing the theft. It also effectively prevents stealing of key auto systems for re-selling by introducing four layers of security features written in the form of firmware and embedded on the Electronic Control Units (ECUs). The details of system design and implementation are described in the paper. The experimental results show that our system is feasible and the owner can securely control his vehicle within a few seconds.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128154276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Wireless Communication for Mobile Robotics and Industrial Embedded Devices 移动机器人和工业嵌入式设备的无线通信
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.46
V. Srovnal, Z. Machacek, V. Srovnal
{"title":"Wireless Communication for Mobile Robotics and Industrial Embedded Devices","authors":"V. Srovnal, Z. Machacek, V. Srovnal","doi":"10.1109/ICN.2009.46","DOIUrl":"https://doi.org/10.1109/ICN.2009.46","url":null,"abstract":"The main objective of this paper is to show new possibilities of wireless communication for mobile robotic and industrial units in the real time. The means of using wireless communication networks based on parallel processing and data transfer for various network topologies are discussed here. We have been focusing our research on ultra low power communication chips based on frequency 2.4GHz. Furthermore we have shown procedures for creation of the network communication nodes with multiple inputs and multiple outputs. The nodes are designed as embedded mobile devices. With regards to data transfer communication there are modulation, security and protocols presented. The contribution shows similar problems that can possibly occur when we use multiple transfer sources at the same time on the close area, which is quite difficult to avoid when we design embedded devices.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126057624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Performance Tests of the Dynamics of the Wireless Networks 无线网络动态性能测试
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.61
J. Kadlec, R. Kuchta, R. Vrba
{"title":"Performance Tests of the Dynamics of the Wireless Networks","authors":"J. Kadlec, R. Kuchta, R. Vrba","doi":"10.1109/ICN.2009.61","DOIUrl":"https://doi.org/10.1109/ICN.2009.61","url":null,"abstract":"Performance of the dynamics of the wireless networks is the key parameter for real-time applications. This paper is focused on the performance tests of the WLAN IEEE 802.11g. New testbed for measuring of network parameters with 10 ns resolution was developed. Three main parameters of network communication in the wireless networks are bandwidth, delay and jitter. Knowing values of those three parameters allows us to decide if the communication network is acceptable for using real-time applications or not. For our future applications of wireless networks in automation platform we need to know precisely all these parameters. Based on the measured dynamics we can select which real-time application is for this wireless network suitable. Another problem of WLANs is their vulnerability to security threads. WLANs can be secured by several security mechanisms but all of these mechanisms have negative impact to the communication speed and final network performance. We also measured impact of used encrypted communication tunnel on the WLAN performance because VPN tunnel with encryption functions is one of the possible security solutions for our future automation applications.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124841178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Impact of AP Placement in WLAN-Based Indoor Positioning System 无线局域网室内定位系统中AP放置的影响
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.50
Oumaya Baala, You Zheng, A. Caminada
{"title":"The Impact of AP Placement in WLAN-Based Indoor Positioning System","authors":"Oumaya Baala, You Zheng, A. Caminada","doi":"10.1109/ICN.2009.50","DOIUrl":"https://doi.org/10.1109/ICN.2009.50","url":null,"abstract":"In recent years, the indoor positioning systems using the existing wireless local area network and Location fingerprinting schemes are the most popular systems. The accuracy of the system is the most important indicator. In this paper we present some experimental results to explore different environment parameters that impact localization error.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124891324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
Efficient Virtualization of High-Performance Network Interfaces 高性能网络接口的高效虚拟化
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.23
H. Fröning, Heiner Litz, U. Brüning
{"title":"Efficient Virtualization of High-Performance Network Interfaces","authors":"H. Fröning, Heiner Litz, U. Brüning","doi":"10.1109/ICN.2009.23","DOIUrl":"https://doi.org/10.1109/ICN.2009.23","url":null,"abstract":"The architecture of modern computing systems is getting more and more parallel, in order to exploit more of the offered parallelism by applications and to increase the system's overall performance. This includes multiple cores per processor module, multi-threading techniques and the resurgence of interest in virtual machines. In spite of this amount of parallelism the network interface is typically available only once. If the network interface is not able to exploit the offered parallelism, it becomes a bottleneck limiting the system's overall performance. To overcome this situation a new virtualization method for network interface is proposed, relying on a speculative mechanism to enqueue work requests. It offers unconstrained and parallel access without any involvement of software instances, allowing to exploit any available parallelism. For an unrestricted use the I/O interface is not modified. Modern parallel computing systems and Virtual Machine environments can be significantly improved with this new virtualization technique.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125017454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信