2007 International Symposium on Communications and Information Technologies最新文献

筛选
英文 中文
Interoperability between set-top box and residential gateway platforms 机顶盒与住宅网关平台之间的互操作性
2007 International Symposium on Communications and Information Technologies Pub Date : 2007-12-04 DOI: 10.1109/ISCIT.2007.4392215
Ming-Chien Yang, N. Sheng, B. Huang, J. Tu
{"title":"Interoperability between set-top box and residential gateway platforms","authors":"Ming-Chien Yang, N. Sheng, B. Huang, J. Tu","doi":"10.1109/ISCIT.2007.4392215","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4392215","url":null,"abstract":"This paper introduces a means of enabling the collaboration of Set-Top Box and Residential Gateway platforms. We propose an approach that can let MHP Xlets use OSGi resources and vice versa, i.e., OSGi bundles use MHP services in a simple and efficient way. In our approach, BundleContexts and XletContexts are passed to authorized Xlets and bundles respectively. We have implemented the required software components, and an experiment has been conducted which has verified that our proposal is practical.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117278848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An efficient self-healing process for ZigBee sensor networks ZigBee传感器网络的有效自愈过程
2007 International Symposium on Communications and Information Technologies Pub Date : 2007-12-04 DOI: 10.1109/ISCIT.2007.4392233
W. Qiu, Peng Hao, R. Evans
{"title":"An efficient self-healing process for ZigBee sensor networks","authors":"W. Qiu, Peng Hao, R. Evans","doi":"10.1109/ISCIT.2007.4392233","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4392233","url":null,"abstract":"Self-healing is an important feature of robust and reliable wireless sensor networks. ZigBee is an industrial standard widely adopted for wireless sensor networks. We propose an efficient process for a ZigBee network to repair itself after node failure or communication breakdown. It allows a disconnected subnet to rejoin the network with minimum message exchanges and, therefore, saves time and energy. This efficiency is achieved by letting a disconnected node to reconnect to the network together with as many descendant nodes as possible. Theoretical and simulation evaluations confirm the efficiency of the proposed process.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114481378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Securing peer-to-peer overlay networks from Sybil Attack 保护点对点覆盖网络免受西比尔攻击
2007 International Symposium on Communications and Information Technologies Pub Date : 2007-12-04 DOI: 10.1109/ISCIT.2007.4392202
E. Lua
{"title":"Securing peer-to-peer overlay networks from Sybil Attack","authors":"E. Lua","doi":"10.1109/ISCIT.2007.4392202","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4392202","url":null,"abstract":"Securing Peer-to-Peer (P2P) overlay networks is complicated by the lack of access control and its collaborative resource infrastructure. A malicious attacker can behave as if it were a larger number of nodes compromising the integrity and security of the whole system, either by impersonating other nodes or claiming multiple arbitrary identities - Sybil Attack. To solve this problem, we propose a hybrid security protocol by unifying the ID-based cryptography and online secret sharing schemes. In contrast to the heavyweight Public Key Infrastructure (PKI) which is complicated and required more memory space, our proposal is able to verify the nodes' identities by easily obtaining the ID-based public signature verification key of every other node from the node identifier in the P2P overlay networks. Through cross-pollination of the two schemes, our hybrid security protocol is able to verify the data communications among overlay nodes and identify any malicious (cheating) nodes in a secured manner. We evaluate our hybrid security protocol and show its effectiveness analytically.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114511273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Multimedia performance of a ubiquitous processor 一种泛在处理器的多媒体性能
2007 International Symposium on Communications and Information Technologies Pub Date : 2007-12-04 DOI: 10.1109/ISCIT.2007.4392246
M. Fukase, K. Noda, H. Takeda, T. Sato
{"title":"Multimedia performance of a ubiquitous processor","authors":"M. Fukase, K. Noda, H. Takeda, T. Sato","doi":"10.1109/ISCIT.2007.4392246","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4392246","url":null,"abstract":"The key to protect huge amount of multimedia data in ubiquitous networks is to introduce safety aware high-performed single VLSI processor systems embedded with cipher process. Thus, we exploited the architecture of a hardware cryptography-embedded multimedia mobile processor named HCgorilla by sophisticatedly unifying up-to-date processor techniques. Although it was provided with carefully selected Java byte codes and cipher codes, FP (floating point) expression was omitted due to the restriction of hardware resource. Considering recent trend of embedded applications like voice recognition, 3D graphics, and image/vision processing, FP hardware is crucial for further enhancing HCgorilla's Java functions. We focus in this article the development of a compact FPU (Floating point number Processing Unit). A FP format specific for HCgorilla is IEEE 754 compatible except the bitwidth representation of FP data. Prioritizing the latency of FPU, it has only 5 stages, and it works at 400 MHz. FPU is built in HCgorilla by adding 16 FP arithmetic codes carefully selected from Java byte codes, and improving the decode stage of the previous HCgorilla. We have so far accomplished the logic synthesis and behavior simulation.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115189150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimal power analysis for network lifetime balance in wireless sensor networks 无线传感器网络中网络寿命平衡的最优功耗分析
2007 International Symposium on Communications and Information Technologies Pub Date : 2007-12-04 DOI: 10.1109/ISCIT.2007.4392192
R. Wen, I. Mareels, B. Krongold
{"title":"Optimal power analysis for network lifetime balance in wireless sensor networks","authors":"R. Wen, I. Mareels, B. Krongold","doi":"10.1109/ISCIT.2007.4392192","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4392192","url":null,"abstract":"Energy usage is one of the most critically important problems in the exploitation of wireless sensor networks. Using the information redundancy typically present in the data streams in sensor networks due to spatial correlation we may address how to optimize the useful life span of a sensor network under energy constraints for each sensor. A new cost criterion for power optimization amongst sensors is presented. Its implementation and the implications of which are discussed in the context of a star network topology.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116241846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Lightweight protocol suite for wireless sensor networks: design and evaluation 无线传感器网络的轻量级协议套件:设计和评估
2007 International Symposium on Communications and Information Technologies Pub Date : 2007-12-04 DOI: 10.1109/ISCIT.2007.4392191
H. Chen, Changcheng Huang, Li Cui
{"title":"Lightweight protocol suite for wireless sensor networks: design and evaluation","authors":"H. Chen, Changcheng Huang, Li Cui","doi":"10.1109/ISCIT.2007.4392191","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4392191","url":null,"abstract":"Lots of protocols have been proposed to make sensor networks more reliable, efficient and applicable. However, a vitally important problem has been neglected, that is the feasibility to implement the protocol and compatibility with other protocols. In this paper, a layered architecture was designed to organize the sensor network protocols in a light way, with detailed description on the interactive interfaces between layers. In accordance with the architecture, a suite of lightweight protocols were designed and implemented as prototypes. Our proposed protocols are featured by their low requirements on the node resources, and high possibility to be deployed in the real world. All these protocols were implemented and evaluated in a unified simulation environment. Simulation results verified our expectation on the performance of the protocols.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125405675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A very low phase noise fully integrated CMOS quadrature LC oscillator for 2.4 GHz bluetooth/WLAN applications 一个非常低的相位噪声完全集成的CMOS正交LC振荡器,用于2.4 GHz蓝牙/WLAN应用
2007 International Symposium on Communications and Information Technologies Pub Date : 2007-12-04 DOI: 10.1109/ISCIT.2007.4391984
O. Frioui, L. Zaid, W. Rahajandraibe, F. Haddad
{"title":"A very low phase noise fully integrated CMOS quadrature LC oscillator for 2.4 GHz bluetooth/WLAN applications","authors":"O. Frioui, L. Zaid, W. Rahajandraibe, F. Haddad","doi":"10.1109/ISCIT.2007.4391984","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4391984","url":null,"abstract":"This paper presents a quadrature voltage-controlled oscillator (QVCO) based on the coupling of two LC-tank VCOs. The QVCO could be tuned between 2.41 and 2.64 GHz, and showed a phase noise of -139 dBc/Hz at 1 MHz offset frequency from the carrier across the whole tuning range, for a current consumption of 20 mA with 2.5-V power supply. A figure-of-merit of -190 dBc/Hz is observed.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126819327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A study on equation error algorithm based on correlation function 基于相关函数的方程误差算法研究
2007 International Symposium on Communications and Information Technologies Pub Date : 2007-12-04 DOI: 10.1109/ISCIT.2007.4392023
R. Kanagawa, J. Okello, N. Sasaoka, E. Kuno, Y. Itoh, M. Kobayashi
{"title":"A study on equation error algorithm based on correlation function","authors":"R. Kanagawa, J. Okello, N. Sasaoka, E. Kuno, Y. Itoh, M. Kobayashi","doi":"10.1109/ISCIT.2007.4392023","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4392023","url":null,"abstract":"Equation error adaptive algorithm (EQ-E) for adaptive infinite impulse response (IIR) digital filter is one of the IIR adaptive algorithms that exhibit global convergence. In the presence of a color disturbance signal, the coefficients of the equation error based adaptive digital filter (ADF) converge to solutions with bias. In this paper, we propose a kind of block adaptive algorithm for the EQ-E IIR ADF. By estimating the correlation functions, the effect of the disturbance signal onto the convergence of the algorithm is reduced.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126124163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposal for a Wireless Mesh Network that realizes seamless handover and its simulation results 一种实现无缝切换的无线Mesh网络的提出及其仿真结果
2007 International Symposium on Communications and Information Technologies Pub Date : 2007-12-04 DOI: 10.1109/ISCIT.2007.4392107
M. Ito, T. Shikama, A. Watanabe
{"title":"Proposal for a Wireless Mesh Network that realizes seamless handover and its simulation results","authors":"M. Ito, T. Shikama, A. Watanabe","doi":"10.1109/ISCIT.2007.4392107","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4392107","url":null,"abstract":"Wireless mesh networks have an advantage of building backbone infrastructure easily, where access points, which have been conventionally connected by wired LANs, are connected by an ad-hoc network using wireless LANs. However, the wireless mesh network still has various problems such as the realization of a seamless handover, the securing of a communication bandwidth, and the selection of the most suitable routing protocol. WAPL (wireless access point link) which we propose in this paper can solve all these problems. Namely, WAPL enables a constant seamless handover. It does not give much influence on the traffic. It can also select ad-hoc routing protocols freely. To realize a seamless handover, WAPL is aware of communication routes all the time and sends an advertising message that reports its handover in a unicast mode. To reduce the traffic of control messages, it generates mapping information, which is the relation between access points and terminals on demand. In WAPL, the function generating mapping information is completely independent of an ad-hoc routing protocol. In this paper, we implemented WAPL in network simulator ns-2, and compared it with the existing methods. We succeeded in showing the features of WAPL quantitatively.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126188411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimized cryptographic binding protocol using MIPv6 over IEEE 802.16e 在IEEE 802.16e上使用MIPv6优化的加密绑定协议
2007 International Symposium on Communications and Information Technologies Pub Date : 2007-12-04 DOI: 10.1109/ISCIT.2007.4392204
HyunHwa Park, Sun-Hee Lim, Seunghwan Yun
{"title":"Optimized cryptographic binding protocol using MIPv6 over IEEE 802.16e","authors":"HyunHwa Park, Sun-Hee Lim, Seunghwan Yun","doi":"10.1109/ISCIT.2007.4392204","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4392204","url":null,"abstract":"In the mobile telecommunication network, the expansion in Internet traffic will cause the demand for IP addresses. Further WiBro will also stimulate the interworking for IP addresses. In fact, many working groups are designing an adaptation mechanism between WiBro and IPv6/MIPv6. Accordingly, from the viewpoint of security, interworking between 802.16e and MIPv6 is essential. In this paper, we propose a secure and efficient OCBP(Optimized Cryptographic Binding Protocol) between Layer 2 and Layer 3 of WiBro system.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122032081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信