21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)最新文献

筛选
英文 中文
Fuzzy Logic Based Admission Control for Multimedia Streams in the UPnP QoS Architecture 基于模糊逻辑的UPnP QoS架构下的多媒体流准入控制
M. Ditze, Matthias Grawinkel
{"title":"Fuzzy Logic Based Admission Control for Multimedia Streams in the UPnP QoS Architecture","authors":"M. Ditze, Matthias Grawinkel","doi":"10.1109/AINAW.2007.193","DOIUrl":"https://doi.org/10.1109/AINAW.2007.193","url":null,"abstract":"Admission Control (AC) avoids network congestion by determining whether a quantified request for resources can be approved without interfering the resource allocation of already accepted traffic flows. For time sensitive networked multimedia applications conventional AC schemes often prove to be unnecessarily strict. The crisp binary admission decision and worst case assumptions on traffic behavior may result in low utilization of resources. In this paper we propose a less stringent fuzzy logic based solution for AC. It decides an admission request according to a collective set of fuzzified Quality of Service (QoS) parameters that anticipate the expected resource utilization. Furthermore, it maps qualitative and quantitative QoS parameters into a single decision metrics. The AC has been incorporated into the service oriented UPnP QoS architecture.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122396427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Buffer Management for Multimedia QoS Control over HSDPA Downlink 基于HSDPA下行链路的多媒体QoS控制缓冲区管理
S. Yerima, K. Al-Begain
{"title":"Buffer Management for Multimedia QoS Control over HSDPA Downlink","authors":"S. Yerima, K. Al-Begain","doi":"10.1109/AINAW.2007.115","DOIUrl":"https://doi.org/10.1109/AINAW.2007.115","url":null,"abstract":"HSDPA specifications include support for a flexible framework for QoS management. In this paper, it is shown how buffer management could be incorporated into HSDPA QoS framework for 'multimedia' traffic QoS control in the MAC-hs of the Node-B. A time-space-priority (TSP) scheme is proposed as viable buffer management scheme to this effect. Comparative simulation study with other schemes is presented, demonstrating the effectiveness of the TSP buffer management scheme for 'multimedia' service QoS control in HSDPA Node-B data buffers.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122908396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Conflict Free Address Allocation Mechanism for Mobile Ad Hoc Networks 移动Ad Hoc网络的无冲突地址分配机制
Sudath Indrasinghe, R. Pereira, J. Haggerty
{"title":"Conflict Free Address Allocation Mechanism for Mobile Ad Hoc Networks","authors":"Sudath Indrasinghe, R. Pereira, J. Haggerty","doi":"10.1109/AINAW.2007.128","DOIUrl":"https://doi.org/10.1109/AINAW.2007.128","url":null,"abstract":"A mobile ad-hoc network (MANET) can be implemented anywhere where there is little or no communication infrastructure, or the existing infrastructure is inconvenient to use. A number of people with mobile devices may connect together to form one large group. Later on, they may split into smaller separate groups and partitions may merge if necessary. Network partitions and merges are potentially frequent occurrences in MANETs, hence address auto-configuration is an important requirement. In this paper we present a mechanism for address auto-configuration in MANETs, which is capable of assigning conflict-free addresses in a dynamic and distributed manner. Also we propose novel mechanisms to address MANET partition and merging.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123856569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Certified Email Protocol Using Key Chains 使用密钥链的认证电子邮件协议
J. Cederquist, M. Dashti, S. Mauw
{"title":"A Certified Email Protocol Using Key Chains","authors":"J. Cederquist, M. Dashti, S. Mauw","doi":"10.1109/AINAW.2007.10","DOIUrl":"https://doi.org/10.1109/AINAW.2007.10","url":null,"abstract":"This paper introduces an asynchronous optimistic certified email protocol, with stateless recipients, that relies on key chains to considerably reduce the storage requirements of the trusted third party. The proposed protocol thereby outperforms the existing schemes that achieve strong fairness. The paper also discusses the revocation of compromised keys as well as practical considerations regarding the implementation of the protocol.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121225336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Conditional Random Fields for Intrusion Detection 入侵检测条件随机场
K. Gupta, B. Nath, K. Ramamohanarao
{"title":"Conditional Random Fields for Intrusion Detection","authors":"K. Gupta, B. Nath, K. Ramamohanarao","doi":"10.1109/AINAW.2007.126","DOIUrl":"https://doi.org/10.1109/AINAW.2007.126","url":null,"abstract":"An intrusion detection system is now an inevitable part of any computer network. With the ever increasing number and diverse type of attacks, including new and previously unseen attacks, the effectiveness of an intrusion detection system is often subjected to testing. The use of such systems have greatly reduced the threat level, however, the networks and hence the data and services offered by them are far away from the state when they can be considered as secure. In this paper we propose and experimentally validate the use and robustness of 'conditional random fields,' for the task of intrusion detection. We show, experimentally, that the conditional random fields, can be very effective in detecting intrusions when compared with the previously known techniques.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121304323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Detecting VLIW Hard Errors Cost-Effectively through a Software-Based Approach 通过基于软件的方法经济有效地检测VLIW硬错误
Abhishek Pillai, Wei Zhang, D. Kagaris
{"title":"Detecting VLIW Hard Errors Cost-Effectively through a Software-Based Approach","authors":"Abhishek Pillai, Wei Zhang, D. Kagaris","doi":"10.1109/AINAW.2007.152","DOIUrl":"https://doi.org/10.1109/AINAW.2007.152","url":null,"abstract":"Research indicates that as technology scales, hard errors such as wear-out errors are increasingly becoming a critical challenge for microprocessor design. While hard errors in memory structures can be efficiently detected by error correction code, detecting hard errors for functional units cost-effectively is a challenging problem. In this paper, we propose to exploit the idle cycles of the under-utilized VLIW functional units to run test instructions for detecting wear-out errors without increasing the hardware cost or significantly impacting performance. We also explore the design space of this software-based approach to balance the error detection latency and the performance for VLIW architectures. Our experimental results indicate that such a software-based approach can effectively detect hard errors with minimum impact on performance for VLIW processors, which is particularly useful for reliable embedded applications with cost constraints.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121393840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Integration of Smart Home Technologies in a Health Monitoring System for the Elderly 智能家居技术与长者健康监测系统的整合
A. Arcelus, Megan Howell Jones, R. Goubran, F. Knoefel
{"title":"Integration of Smart Home Technologies in a Health Monitoring System for the Elderly","authors":"A. Arcelus, Megan Howell Jones, R. Goubran, F. Knoefel","doi":"10.1109/AINAW.2007.209","DOIUrl":"https://doi.org/10.1109/AINAW.2007.209","url":null,"abstract":"Among older adults, the challenges of maintaining mobility and cognitive function make it increasingly difficult to remain living alone independently. As a result, many older adults are forced to seek residence in costly clinical institutions where they can receive constant medical supervision. A home-based automated system that monitors their health and well- being while remaining unobtrusive would provide them with a more comfortable and independent lifestyle, as well as more affordable care. This paper presents a smart home system for the elderly, developed by the Technology Assisted Friendly Environment for the Third Age (TAFETA) group. It introduces the sensor technologies integrated in the system and develops a framework for the processing and communication of the extracted information. It also considers the acceptability and implications of this technology from the perspective of the potential occupants.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128693376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 149
Energy Efficient Spatial Query Processing in Wireless Sensor Networks 无线传感器网络中的节能空间查询处理
Kyungseo Park, Byoungyong Lee, R. Elmasri
{"title":"Energy Efficient Spatial Query Processing in Wireless Sensor Networks","authors":"Kyungseo Park, Byoungyong Lee, R. Elmasri","doi":"10.1109/AINAW.2007.171","DOIUrl":"https://doi.org/10.1109/AINAW.2007.171","url":null,"abstract":"Because a sensor network depends on limited battery power, energy saving is important to increase the sensor network lifespan. We propose semi-distributed spatial query indexing structure that disseminates a query into the network and retrieves data energy efficiently using a localized tree building algorithm. We also propose a sectioned tree index, which divides the network area into several squares and each square has a local index subtree organized within that square. Local trees are interconnected to form one big tree in the network. Local trees are also built based on any algorithm that is energy consumption aware at each sub-root node in a locally centralized way. We use an existing two dimensional indexing technique for energy efficient query dissemination. We show that our proposed scheme is energy efficient for query and data processing heuristically. Our proposed scheme, sectioned tree, is finally simulated in sparse and dense networks to show the energy saving for query and data processing in the sensor network.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116837322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Group-Based Dynamic Key Management Scheme in Wireless Sensor Networks 一种基于组的无线传感器网络动态密钥管理方案
Guorui Li, Jingsha He, Yingfang Fu
{"title":"A Group-Based Dynamic Key Management Scheme in Wireless Sensor Networks","authors":"Guorui Li, Jingsha He, Yingfang Fu","doi":"10.1109/AINAW.2007.27","DOIUrl":"https://doi.org/10.1109/AINAW.2007.27","url":null,"abstract":"Sensor networks are widely used in a variety of commercial and military applications. As a fundamental requirement for providing security functionality in sensor networks, key management plays an essential role in authentication and encryption. In this paper, we propose a group-based dynamic key management scheme in wireless sensor networks. In our scheme, there is no requirement for such infrastructure as base stations and cluster heads and the dynamic key update feature ensures the security of the network without tampering the compromised sensor nodes. We also analyze the connectivity and security of the proposed scheme.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115420743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Parallel Mining Algorithm for Closed Sequential Patterns 封闭序列模式的并行挖掘算法
Tian Zhu, Sixue Bai
{"title":"A Parallel Mining Algorithm for Closed Sequential Patterns","authors":"Tian Zhu, Sixue Bai","doi":"10.1109/AINAW.2007.40","DOIUrl":"https://doi.org/10.1109/AINAW.2007.40","url":null,"abstract":"Mining closed sequential patterns is an important data mining task with broad applications, the large dataset acquires us to use the parallel technique to solve the problems in data mining. A new parallel algorithm named Par-ClosP is introduced in this paper. It partitions the task to each processor, reduces the communication among the processors, uses pseudo projection technique to minimize the use of time and space, and it introduces a new pruning method, thus improves the efficiency of the algorithm.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115484336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信