2007 IEEE International Performance, Computing, and Communications Conference最新文献

筛选
英文 中文
Protecting First-Level Responder Resources in an IP-based Emergency Services Architecture 在基于ip的紧急服务体系结构中保护一级响应器资源
2007 IEEE International Performance, Computing, and Communications Conference Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358952
H. Tschofenig, H. Schulzrinne, M. Shanmugam, A. Newton
{"title":"Protecting First-Level Responder Resources in an IP-based Emergency Services Architecture","authors":"H. Tschofenig, H. Schulzrinne, M. Shanmugam, A. Newton","doi":"10.1109/PCCC.2007.358952","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358952","url":null,"abstract":"Recently, there has been increased interest, shown by the research community and by industry fora, to enable emergency services for voice-over-IP based architectures. In order to provide emergency services functionality over the Internet, several aspects like location determination, dial string configuration, location conveyance, routing to the appropriate public safety answering point (PSAP) and security aspects have to be considered. This paper discusses security threats for the IP-based emergency architecture concentrating on denial-of-service attacks against public safety answering points (PSAPs) by using faked calls that aim to exhaust limited PSAP resources, such as the emergency personnel. We illustrate a number of different approaches that have been mentioned in the past to tackle these threats, including location signing, location-by-reference and authenticated emergency calls.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114301794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Towards a Collusion-Resistant Algebraic Multi-Party Protocol for Privacy-Preserving Association Rule Mining in Vertically Partitioned Data 垂直分割数据中隐私保护关联规则挖掘的抗合谋代数多方协议研究
2007 IEEE International Performance, Computing, and Communications Conference Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358920
D. Trinca, S. Rajasekaran
{"title":"Towards a Collusion-Resistant Algebraic Multi-Party Protocol for Privacy-Preserving Association Rule Mining in Vertically Partitioned Data","authors":"D. Trinca, S. Rajasekaran","doi":"10.1109/PCCC.2007.358920","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358920","url":null,"abstract":"Privacy-preserving data mining has recently become an attractive research area, mainly due to its numerous applications. Within this area, privacy-preserving association rule mining has received considerable attention, and most algorithms proposed in the literature have focused on the case when the database to be mined is distributed, usually horizontally or vertically. In this paper, we focus on the case when the database is distributed vertically, and propose an efficient multi-party protocol for evaluating item-sets that preserves the privacy of the individual parties. The proposed protocol is algebraic and recursive in nature, and is based on a recently proposed two-party protocol for the same problem. It is not only shown to be much faster than similar protocols, but also more secure. We also present a variant of the protocol that is resistant to collusion among parties.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115373354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
LoST: A Protocol for Mapping Geographic Locations to Public Safety Answering Points LoST:将地理位置映射到公共安全应答点的协议
2007 IEEE International Performance, Computing, and Communications Conference Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358949
H. Schulzrinne, H. Tschofenig, A. Newton, T. Hardie
{"title":"LoST: A Protocol for Mapping Geographic Locations to Public Safety Answering Points","authors":"H. Schulzrinne, H. Tschofenig, A. Newton, T. Hardie","doi":"10.1109/PCCC.2007.358949","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358949","url":null,"abstract":"Public safety answering points (PSAPs) serve limited geographic areas, so emergency callers must be directed to the most appropriate PSAP. As part of the overall Internet Engineering Task Force (IETF) emergency services architecture, we have developed a new protocol, LoST (location-to-service translation), that allows end systems and voice-over-IP (VoIP) proxies to map location data into URLs representing either PSAPs or other session initiation protocol (SIP) proxies that perform a more fine-grained mapping. LoST is designed to operate globally, with a highly-distributed authority.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"287 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122003317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Model-Based Admission Control for 802.11e EDCA using Delay Predictions 基于延迟预测的802.11e EDCA模型允许控制
2007 IEEE International Performance, Computing, and Communications Conference Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358899
A. Bai, T. Skeie, P. Engelstad
{"title":"A Model-Based Admission Control for 802.11e EDCA using Delay Predictions","authors":"A. Bai, T. Skeie, P. Engelstad","doi":"10.1109/PCCC.2007.358899","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358899","url":null,"abstract":"This paper presents a unique approach for a model-based admission control algorithm for the IEEE 802.11e enhanced distributed channel access (EDCA) standard. The analytical model used as the foundation for the algorithm covers both nonsaturation and saturation conditions. This allows us to keep the system out of saturation by monitoring several variables. Since the medium access delay represents the service time of the system, it is used as the threshold condition to ensure that the queuing delay is within reasonable bounds. The paper describes the admission control algorithm and several simulation results are presented and discussed.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129831586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Priority-Ensured Medium Access in Ad Hoc Networks Ad Hoc网络中保证优先级的介质访问
2007 IEEE International Performance, Computing, and Communications Conference Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358892
Jun Peng, Liang Cheng
{"title":"Priority-Ensured Medium Access in Ad Hoc Networks","authors":"Jun Peng, Liang Cheng","doi":"10.1109/PCCC.2007.358892","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358892","url":null,"abstract":"How to ensure medium access priority for specific traffic in a fully-distributed ad hoc network is still a relatively open problem. However, for some applications such as emergency message dissemination in ad hoc networks, priority-ensured medium access is critical for timely message delivery. This paper proposes a new medium access control (MAC) scheme that provides priority-ensured medium access service for such applications in fully-distributed ad hoc networks. The basic idea of the scheme is to encode and deliver priority information by out-of-band pulses. The comprehensive simulation results in the paper show that the proposed MAC scheme is effective in serving emergency message dissemination in vehicular ad hoc networks.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129924441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Gossip-Style Crash Faults Detection Protocol for Wireless Ad-Hoc and Mesh Networks 无线Ad-Hoc和Mesh网络的八卦式崩溃故障检测协议
2007 IEEE International Performance, Computing, and Communications Conference Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358948
M. Elhadef, A. Boukerche
{"title":"A Gossip-Style Crash Faults Detection Protocol for Wireless Ad-Hoc and Mesh Networks","authors":"M. Elhadef, A. Boukerche","doi":"10.1109/PCCC.2007.358948","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358948","url":null,"abstract":"In this paper, we introduce a new failure detector for wireless ad-hoc and mesh networks that adapts the detection parameters to the current state of the network. This new crash faults detector implements a variant of the heartbeat approach on top of a gossip-style failure detection protocol. Our failure detector is shown be eventually perfect by satisfying both properties: strong completeness (i.e., there is a time after which every faulty mobile is permanently suspected by every fault-free host) and eventual strong accuracy (i.e., no host will be suspected before it crashes).","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125997142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Components and Analysis of Disaster Tolerant Computing 容灾计算的组成与分析
2007 IEEE International Performance, Computing, and Communications Conference Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358917
Chad M. Lawler, Michael A. Harper, Mitchell A. Thornton
{"title":"Components and Analysis of Disaster Tolerant Computing","authors":"Chad M. Lawler, Michael A. Harper, Mitchell A. Thornton","doi":"10.1109/PCCC.2007.358917","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358917","url":null,"abstract":"This paper provides a review of the components of disaster tolerant computing and communications and reviews the current state in light of recent man-made terrorist events. The paper examines the relationships between disaster tolerant systems, information technology (IT) application availability and executive level management visibility necessary for successful system operations in the event of a catastrophic disaster; one which causes rapid, almost simultaneous, multiple points of failure in a system, as well as a single points of failure that escalate into wide catastrophic system failures. The technology, process and human resource challenges of traditional disaster recovery approaches to disaster preparedness are outlined. The risks of IT application downtime attributable to the increasing dependence on critical information technology applications operating in distributed and unbounded networks are explored. A general method for disaster tolerance is proposed which mitigates unplanned downtime through a disciplined approach of IT infrastructure design based on redundancy and distributed components with special attention given to the ability of executive level management to comprehend the value of uptime of an application and make appropriate capital investment. The importance of executive visibility into the system wide impact of downtime and the resultant effects on the costs of downtime of critical systems is explored.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125277566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
C2AP: Coverage-aware and Connectivity-constrained Actor Positioning in Wireless Sensor and Actor Networks 无线传感器和行动者网络中覆盖感知和连接约束的行动者定位
2007 IEEE International Performance, Computing, and Communications Conference Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358905
K. Akkaya, M. Younis
{"title":"C2AP: Coverage-aware and Connectivity-constrained Actor Positioning in Wireless Sensor and Actor Networks","authors":"K. Akkaya, M. Younis","doi":"10.1109/PCCC.2007.358905","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358905","url":null,"abstract":"In addition to the miniaturized sensor nodes, wireless sensor and actor networks (WSANs) employ significantly more capable actor nodes that can perform application specific actions to deal with events detected and reported by the sensors. Since these actions can be taken at any spot within the monitored area, the actors should be carefully placed in order to provide maximal coverage. Moreover, the actors often coordinate among themselves in order to arbitrate tasks and thus inter-actor connectivity is usually a requirement. In this paper, we propose a distributed actor positioning algorithm that maximizes the coverage of actors without violating the connectivity requirement. The approach applies repelling forces between neighboring actors, similar to molecular particles in Physics, in order to spread them in the region. However, the movement of each actor is restricted in order to maintain the connectivity of the inter-actor network. The performance of the approach is validated through simulations.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129138925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
Performance Evaluation of Optimized Link State Routing-based Localization 基于链路状态路由的优化定位性能评价
2007 IEEE International Performance, Computing, and Communications Conference Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358890
T. Takenaka, H. Mineno, Yuichi Tokunaga, N. Miyauchi, T. Mizuno
{"title":"Performance Evaluation of Optimized Link State Routing-based Localization","authors":"T. Takenaka, H. Mineno, Yuichi Tokunaga, N. Miyauchi, T. Mizuno","doi":"10.1109/PCCC.2007.358890","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358890","url":null,"abstract":"Node localization obtained by estimating node positions is an essential technique for wireless multi-hop networks. In this paper, we present an optimized link state routing (OLSR)-based localization (ROULA) that satisfies the following key design requirements: (i) Independency from anchor nodes, (ii) robustness for non-convex network topology, and (iii) Compatibility with network protocol. ROULA is independent from anchor nodes and can obtain the correct node positions in non-convex network topology. In addition, ROULA is compatible with OLSR protocol, and it uses the inherent distance characteristic of multipoint relay (MPR) nodes. We reveal characteristics of MPR selection and the farthest 2-hop node selection used in ROULA, and describe how these node selections contribute to reducing the distance error for a localization scheme without ranging devices. We used a simulation to specify appropriate MPR_COVERAGE for ROULA, and give a comparative performance evaluation of ROULA for various scenarios including non-convex network topology and various deployment radii of anchor nodes. Our evaluation proves that ROULA is effective for localization in various network scenarios.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"79 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130691614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Applying Formal Evaluation to Worm Defense Design 形式化评估在蠕虫防御设计中的应用
2007 IEEE International Performance, Computing, and Communications Conference Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358930
R. Sharykin, Phillip A. Porras
{"title":"Applying Formal Evaluation to Worm Defense Design","authors":"R. Sharykin, Phillip A. Porras","doi":"10.1109/PCCC.2007.358930","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358930","url":null,"abstract":"We discuss the early insertion of formal analyses in distributed malware defense evaluation, and provide an example method for applying an executable rewriting logic specification to drive both simulation and property validation of a collaborative group-based worm defense. An important aspect of the algorithm under consideration is its distributed and probabilistic nature, which makes the defense system harder to attack but unfortunately also complicates the ability of designers to fully understand its behavioral properties. We demonstrate one approach to formally analyze our case study worm defense algorithm, employing tools that facilitate both statistical simulation and property validation. Our approach is posed as complementary to the current practice of informal design specification and evaluation through network simulation.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128454368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信