2016 Fourth International Symposium on Computing and Networking (CANDAR)最新文献

筛选
英文 中文
Information Dissemination Scheme Using Mobile Agents in Autonomous Clustering-Based Heterogeneous Wireless Networks 基于自主聚类的异构无线网络中基于移动代理的信息传播方案
2016 Fourth International Symposium on Computing and Networking (CANDAR) Pub Date : 2016-11-01 DOI: 10.1109/CANDAR.2016.0057
Takeshi Hashimoto, Ryota Ito, T. Ohta, Y. Kakuda
{"title":"Information Dissemination Scheme Using Mobile Agents in Autonomous Clustering-Based Heterogeneous Wireless Networks","authors":"Takeshi Hashimoto, Ryota Ito, T. Ohta, Y. Kakuda","doi":"10.1109/CANDAR.2016.0057","DOIUrl":"https://doi.org/10.1109/CANDAR.2016.0057","url":null,"abstract":"Recently, mobile nodes (smartphones) used by many users have both cellular (4G/LTE) and short range ad hoc (wifi) connections. A mobile node can connect with the cellular network by the cellular connection and communicate with a distant mobile node, while it can configure a multi-hop network (mobile ad hoc network) and communicate with nearby nodes by the short range ad hoc connection. For information dissemination, if all the messages are disseminated by cellular networks in any types of applications and services, the cellular base stations incur heavy overload. Therefore, in this paper, we propose an information dissemination scheme using mobile agents in heterogeneous wireless network which combines a cellular network and a mobile ad hoc network. At first, the proposed scheme disseminates data messages with lower number of cellular base stations to some specified mobile nodes in the cellular network. Then, it disseminates data messages from the specified nodes to all nodes by mobile agents in the mobile ad hoc network.","PeriodicalId":322499,"journal":{"name":"2016 Fourth International Symposium on Computing and Networking (CANDAR)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127290518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Fluctuating Goals on Adaptability of Evolvable VNF Placement Method 波动目标对可进化VNF布局方法适应性的影响
2016 Fourth International Symposium on Computing and Networking (CANDAR) Pub Date : 2016-11-01 DOI: 10.1109/CANDAR.2016.0061
Mari Otokura, K. Leibnitz, Y. Koizumi, D. Kominami, T. Shimokawa, M. Murata
{"title":"Impact of Fluctuating Goals on Adaptability of Evolvable VNF Placement Method","authors":"Mari Otokura, K. Leibnitz, Y. Koizumi, D. Kominami, T. Shimokawa, M. Murata","doi":"10.1109/CANDAR.2016.0061","DOIUrl":"https://doi.org/10.1109/CANDAR.2016.0061","url":null,"abstract":"Software Defined Network (SDN) and Network Function Virtualization (NFV) are effective techniques to deal with dynamically changing network environments. Furthermore, the combination of SDN and NFV permits telecommunication service providers to offer sequences of virtualized network functions to their users through Service Function Chaining (SFC). In the context of SFC, the Virtual Network Function (VNF) placement problem, i.e., determining where the virtual functions should be located in the network, needs to be solved dynamically whenever new function chains are requested. In our previous work, we proposed an evolutionary method for dynamic VNF placement problems named Evolvable VNF Placement (EvoVNFP). This current paper aims at evaluating EvoVNFP in greater detail to clarify the influence of the parameter settings on the performance of EvoVNFP. Results from computer simulations show that appropriate settings of sub-goal period lengths and number of mutations help improve the adaptability and convergence speed of EvoVNFP.","PeriodicalId":322499,"journal":{"name":"2016 Fourth International Symposium on Computing and Networking (CANDAR)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130357743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Tight Bounds for Two-Hop Delivery in Homogeneous P2P Video Streaming Systems 同构P2P视频流系统中两跳传输的紧密边界
2016 Fourth International Symposium on Computing and Networking (CANDAR) Pub Date : 2016-11-01 DOI: 10.1109/CANDAR.2016.0018
Hironori Ando, S. Fujita
{"title":"Tight Bounds for Two-Hop Delivery in Homogeneous P2P Video Streaming Systems","authors":"Hironori Ando, S. Fujita","doi":"10.1109/CANDAR.2016.0018","DOIUrl":"https://doi.org/10.1109/CANDAR.2016.0018","url":null,"abstract":"In Peer-to-Peer (P2P) video streaming systems, a stream of chunks is delivered from the source to all participant peers by utilizing upload bandwidth of the participants. The given stream is generally divided into several sub-streams and those sub-streams are delivered through different spanning trees. In this paper, we consider the delivery of a sub-streams to n subscribers through a spanning trees of depth two each. We call such a delivery of sub-streams a 2-hop delivery of the given video stream. The main contribution of the current paper is that it completely identifies a function Θ(a,n) such that the 2-hop delivery of a sub-streams to n subscribers is possible if and only if the upload bandwidth of each peer is at least Θ(a,n).","PeriodicalId":322499,"journal":{"name":"2016 Fourth International Symposium on Computing and Networking (CANDAR)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115093255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cellular Automaton Modeling of SDP System and its Applications in 1D Traffic Flow 元胞自动机SDP系统建模及其在一维交通流中的应用
2016 Fourth International Symposium on Computing and Networking (CANDAR) Pub Date : 2016-11-01 DOI: 10.1109/CANDAR.2016.0050
A. Tomoeda
{"title":"Cellular Automaton Modeling of SDP System and its Applications in 1D Traffic Flow","authors":"A. Tomoeda","doi":"10.1109/CANDAR.2016.0050","DOIUrl":"https://doi.org/10.1109/CANDAR.2016.0050","url":null,"abstract":"Cellular Automaton (CA) is a new and suitable approach to model various kinds of SDP systems, such as vehicular traffic, pedestrian dynamics, and logistics. Especially, the advantages of CA modeling approach are follows; (1) CA models can explicitly consider the exclusion principle, which is an essential factor of SDP system. (2) Some of CA models, e.g. TASEP, can be solved analytically. In this paper, we present some results about two traffic situations, i.e., the dynamics through a rail crossing and the dynamics in a queue of vehicles, using a CA model for 1D traffic flow.","PeriodicalId":322499,"journal":{"name":"2016 Fourth International Symposium on Computing and Networking (CANDAR)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132642491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of VM-based Intrusion Tolerant Systems with Poisson Arrivals 基于泊松到达的虚拟机入侵容忍系统性能评估
2016 Fourth International Symposium on Computing and Networking (CANDAR) Pub Date : 2016-11-01 DOI: 10.1109/CANDAR.2016.0041
Junjun Zheng, H. Okamura, T. Dohi
{"title":"Performance Evaluation of VM-based Intrusion Tolerant Systems with Poisson Arrivals","authors":"Junjun Zheng, H. Okamura, T. Dohi","doi":"10.1109/CANDAR.2016.0041","DOIUrl":"https://doi.org/10.1109/CANDAR.2016.0041","url":null,"abstract":"Computer security has become an increasingly important hot topic in computer and communication industry, since it is important to support critical business process and to protect personal and sensitive information. Computer security is to keep security attributes (confidentiality, integrity and availability) of computer systems, which face the threats such as deny-of-service (DoS), virus and intrusion. To ensure high computer security, the intrusion tolerance technique based on fault-tolerant scheme has been widely applied. This paper presents the quantitative performance evaluation of a virtual machine (VM) based intrusion tolerant system. Concretely, two security measures are derived; MTTSF (mean time to security failure) and the effective traffic intensity. The mathematical analysis is achieved by using Laplace-Stieltjes transforms according to the analysis of M/G/1 queueing system.","PeriodicalId":322499,"journal":{"name":"2016 Fourth International Symposium on Computing and Networking (CANDAR)","volume":"285 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130940986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Mapping Heuristic for Minimizing Message Latency in Massively Distributed MCTS 大规模分布式MCTS中最小化消息延迟的映射启发式算法
2016 Fourth International Symposium on Computing and Networking (CANDAR) Pub Date : 2016-11-01 DOI: 10.1109/CANDAR.2016.0100
Alonso Gragera, Vorapong Suppakitpaisarn
{"title":"A Mapping Heuristic for Minimizing Message Latency in Massively Distributed MCTS","authors":"Alonso Gragera, Vorapong Suppakitpaisarn","doi":"10.1109/CANDAR.2016.0100","DOIUrl":"https://doi.org/10.1109/CANDAR.2016.0100","url":null,"abstract":"We propose a topology-aware heuristic that significantly reduces the message latency for search trees of tree parallel Monte-Carlo Tree Search. There exist many communication-aware and topology-aware mappings. However, those mappings are not applicable to the hash driven parallel search techniques. This is because in hash driven parallel search each graph/tree node is randomly distributed based on a hash function and each edge is also randomly connected, so each computation cluster only knows about the tasks that are being executed on themselves, so it is not possible to do dynamic load balancing according to the current status of the network. To cope with that, we devise an heuristic based on the depth of each search tree node and the betweenness centrality of each computational cluster of the network topology. Our experimental results show that we can reduce the average message latency by 15% to 35%.","PeriodicalId":322499,"journal":{"name":"2016 Fourth International Symposium on Computing and Networking (CANDAR)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114869263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic Generation of Temporal Feature Vectors with Application to Tourism Recommender Systems 时间特征向量的自动生成及其在旅游推荐系统中的应用
2016 Fourth International Symposium on Computing and Networking (CANDAR) Pub Date : 2016-11-01 DOI: 10.1109/CANDAR.2016.0121
Guan-Shen Fang, S. Kamei, S. Fujita
{"title":"Automatic Generation of Temporal Feature Vectors with Application to Tourism Recommender Systems","authors":"Guan-Shen Fang, S. Kamei, S. Fujita","doi":"10.1109/CANDAR.2016.0121","DOIUrl":"https://doi.org/10.1109/CANDAR.2016.0121","url":null,"abstract":"Recommender systems have been widely used in our daily life to recommend objects to users meeting the users' preference. In this paper, we focus on objects with temporally variable features such as restaurant with seasonal dishes and point-of-interests (POIs) to have seasonal attractions, and propose a method to automatically generate temporal feature vectors for those objects. The basic idea of the proposed method is: 1) to identify the vocabulary concerned with objects through Wikipedia; 2) to identify the trend over all objects through Twitter; and 3) to highlight the weight of words contained in each identified trend to obtain temporal feature vectors for each object. We built a tourism recommender system to evaluate the effectiveness of the proposed method. The result of experiments indicates that: 1) the variance of temporal feature vectors follows the Gaussian distribution, 2) those vectors certainly reflect the similarity of POIs for a designated time period, and 3) such a property of feature vectors can be effectively used for the seasonal recommendation of POIs.","PeriodicalId":322499,"journal":{"name":"2016 Fourth International Symposium on Computing and Networking (CANDAR)","volume":"424 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116050363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On Availability and Energy Consumption of the Fast Connection Establishment Method by Using Bluetooth Classic and Bluetooth Low Energy 经典蓝牙和低功耗蓝牙快速连接建立方法的可用性和能耗研究
2016 Fourth International Symposium on Computing and Networking (CANDAR) Pub Date : 2016-11-01 DOI: 10.1109/CANDAR.2016.0058
Nobuhiro Kajikawa, Yuya Minami, Eitaro Kohno, Y. Kakuda
{"title":"On Availability and Energy Consumption of the Fast Connection Establishment Method by Using Bluetooth Classic and Bluetooth Low Energy","authors":"Nobuhiro Kajikawa, Yuya Minami, Eitaro Kohno, Y. Kakuda","doi":"10.1109/CANDAR.2016.0058","DOIUrl":"https://doi.org/10.1109/CANDAR.2016.0058","url":null,"abstract":"Bluetooth is a low-energy consumption communication technology and a prospective communication method for emergency situations. A Classic Bluetooth communication network has been proposed and designed to establish an emergency mobile ad hoc network (hereinafter referred to as Classic Bluetooth MANETs). In Classic Bluetooth MANETs, a terminal can cause an excess of connection retries and connection conflicts. These problems can slow down the time it takes to establish connections. Therefore, time-consuming connection establishment causes the degradation of the operation rate in Bluetooth MANETs. In this paper, we propose a new fast connection establishment method by using both Bluetooth Classic and Bluetooth Low Energy (BLE) technologies. We have also implemented and evaluated our proposed method through real terminal experiments. As a result, we have confirmed that the connection latency of our proposed method is almost 75 percent lower than that of Classic Bluetooth MANETs and the energy consumption of our proposed method is less than that of Classic Bluetooth MANETs.","PeriodicalId":322499,"journal":{"name":"2016 Fourth International Symposium on Computing and Networking (CANDAR)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116350087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Decryption of Frequent Password Hashes in Rainbow Tables 彩虹表中频繁密码哈希的解密
2016 Fourth International Symposium on Computing and Networking (CANDAR) Pub Date : 2016-11-01 DOI: 10.1109/CANDAR.2016.0117
Hwei-Ming Ying, N. Kunihiro
{"title":"Decryption of Frequent Password Hashes in Rainbow Tables","authors":"Hwei-Ming Ying, N. Kunihiro","doi":"10.1109/CANDAR.2016.0117","DOIUrl":"https://doi.org/10.1109/CANDAR.2016.0117","url":null,"abstract":"Time-memory trade-off methods provide means to invert one way functions. Such attacks offer a flexible trade-off between running time and memory cost in accordance to users' computational resources. In particular, they can be applied to hash values of passwords in order to recover the plaintext. They were introduced by Martin Hellman and later improved by Philippe Oechslin with the introduction of rainbow tables. The drawbacks of rainbow tables are that they do not always guarantee a successful inversion. We address this issue in this paper. In the context of passwords, it is pertinent that frequently used passwords are incorporated in the rainbow table. It has been known that up to 4 given passwords can be incorporated into a chain but it is an open problem if more than 4 passwords can be achieved. We solve this problem by showing that it is possible to incorporate more of such passwords along a chain. Furthermore, we prove that this results in faster recovery of such passwords during the online running phase as opposed to assigning them at the beginning of the chains. For large chain lengths, the average improvement translates to 3 times the speed increase during the online recovery time.","PeriodicalId":322499,"journal":{"name":"2016 Fourth International Symposium on Computing and Networking (CANDAR)","volume":"476 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134376274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Estimate of the Complexity of the Section Finding Problem on Algebraic Surfaces 代数曲面上截面求出问题的复杂度估计
2016 Fourth International Symposium on Computing and Networking (CANDAR) Pub Date : 2016-11-01 DOI: 10.1109/CANDAR.2016.0021
Shinya Okumura, K. Akiyama, T. Takagi
{"title":"An Estimate of the Complexity of the Section Finding Problem on Algebraic Surfaces","authors":"Shinya Okumura, K. Akiyama, T. Takagi","doi":"10.1109/CANDAR.2016.0021","DOIUrl":"https://doi.org/10.1109/CANDAR.2016.0021","url":null,"abstract":"Researching post-quantum cryptography has been an important task in cryptography. The section finding problem on algebraic surfaces (AS-SFP) is considered to be intractable also after building quantum computers. Thus AS-SFP is used as a basis of the security of the Algebraic Surface Cryptosystem (ASC), which is a candidate of post-quantum cryptosystems, and it is important for designing parameters which make ASC secure to estimate the complexity of AS-SFP. Solving AS-SFP is reduced to solving certain multivariate equation systems (section equation systems) of high degrees, and one can solve such equation systems by using the Grobner basis technique. Although estimating the complexity of computing a Grobner basis associated with an equation system is difficult in general, it becomes easy if the equation system is semi-regular. In this paper, we experimentally estimate the complexity of AS-SFP. From our experimental results, although we see that section equation systems do not become semi-regular in most cases for small parameters, we can infer parameters closely related to the difficulty of computing Grobner bases associated with section equation systems. According to our inference, we estimate the complexity of AS-SFP and parameters which make ASC 128-bit security against the attack by the Grobner basis technique. We also consider a brute-force attack against AS-SFP and conjecture that the brute-force attack is more efficient than the attack by the Grobner basis technique. Finally, we estimate parameters and sizes of public keys such that ASC has 128-bit security against the brute-force attack. Its size (876 bits) is much smaller than sizes of public keys in other efficient candidates of PQC.","PeriodicalId":322499,"journal":{"name":"2016 Fourth International Symposium on Computing and Networking (CANDAR)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133158436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信