2013 27th International Conference on Advanced Information Networking and Applications Workshops最新文献

筛选
英文 中文
CCN-TV: A Data-centric Approach to Real-Time Video Services CCN-TV:以数据为中心的实时视频服务方法
Vincenzo Ciancaglini, G. Piro, Riccardo Loti, L. Grieco, L. Liquori
{"title":"CCN-TV: A Data-centric Approach to Real-Time Video Services","authors":"Vincenzo Ciancaglini, G. Piro, Riccardo Loti, L. Grieco, L. Liquori","doi":"10.1109/WAINA.2013.19","DOIUrl":"https://doi.org/10.1109/WAINA.2013.19","url":null,"abstract":"Content-Centric Networking (CCN) is a promising data-centric architecture, based on in-network caching, name-driven routing, and receiver-initiated sessions, which can greatly enhance the way Internet resources are currently used, making support for a broader set of users with increasing traffic demands possible. The CCN vision is, currently, attracting the attention of many researchers across the world, since it has all the potential to become ready to the market, to be gradually deployed in the Internet of today, and to facilitate a graceful transition from a host-centric networking rationale to a more effective data-centric working behaviour. At the same time, several issues have to be investigated before CCN can be safely deployed at the Internet scale. They include routing, congestion control, caching operations, name-space planning, and application design. With reference to application-related facets, it is worth noticing that the demand for TV services is growing at an exponential rate over time, thus requiring a very careful analysis of their performance in CCN architectures. To this end, in the present contribution we deploy a CCN-TV system, capable of delivering real-time streaming TV services, and we evaluate its performance through a simulation campaign based on real-world topologies.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130757071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A Secure Shared Group Model of Cloud Storage 云存储安全共享组模型
Ching-Hung Yeh
{"title":"A Secure Shared Group Model of Cloud Storage","authors":"Ching-Hung Yeh","doi":"10.1109/WAINA.2013.231","DOIUrl":"https://doi.org/10.1109/WAINA.2013.231","url":null,"abstract":"Cloud Computing has been envisioned as the next-wave system architectures of IT. Essentially, it can have ubiquitous access through variety of devices and applications provided by cloud service providers. In particular, cloud storage service brings benefits not only low cost and scalability, but also great appropriateness for group working, such as learning resource storage. However, the data security and privacy protection is still regarded as challenges. This paper aims the present problem, a secure shared group model of cloud storage is presented. With the using of crypto logical technology, the groups share their data security and efficiency. According to our security analysis and efficiency evaluation, the proposed model have lightweight overheads in terms of keys management as also security and confidentiality can be protected in cloud storage.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133484443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
All Silicon Data Center, the Energy Perspectives 全硅数据中心,能源展望
Antonio Scarfò
{"title":"All Silicon Data Center, the Energy Perspectives","authors":"Antonio Scarfò","doi":"10.1109/WAINA.2013.186","DOIUrl":"https://doi.org/10.1109/WAINA.2013.186","url":null,"abstract":"The energy consumption related to data centers is ever increasing, despite the significant efficiency improvements in the involved technologies and the economic crisis. Pervasive adoption of virtualization, decreasing of PUE as well as new features related to energy-efficiency are not able to stop this growth trend, mainly sustained from the explosion of cloud services in both the fixed and mobile ICT markets. One of the most important factors that contributes to the increase in the data center energy demand is the evolution of data utilization in cloud environments. Big data support is one of the main driver of this process, new data sources continuously produce huge amounts of mostly unstructured data, that should be stored in large centralized storage systems to be accessed by the cloud users and analyzed by the companies in real time. This has a disruptive effect for the energy consumption of the data center hosting the above storage resources, that's why the data need to be stored and analyzed in IOPS intensive style. Flash memory technologies can play a key role in such scenario, since they can reduce dramatically both the storage footprint and energy consumption and increase applications performances bringing appreciable economic benefits. This fundamental efficiency and performance improvement for storage architectures can't be supported by legacy technologies because they are not designed to use flash technologies but rather they are based on energy-hungry legacy mechanical disks. That is limit the energy efficiency and performance delivered by solid state disks (SSD) installed in legacy storage systems, opening the door to the development of new technologies that will be able to fully exploit the potential of flash disks. The aim of this work is presenting a brief survey about the potential of flash technologies for improving the energy efficiency of data center storage systems supporting the incoming Big Data services.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131316451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Early Detection Method of Service Quality Reduction Based on Linguistic and Time Series Analysis of Twitter 基于语言和时间序列分析的Twitter服务质量降低早期检测方法
K. Ikeda, Gen Hattori, C. Ono, H. Asoh, T. Higashino
{"title":"Early Detection Method of Service Quality Reduction Based on Linguistic and Time Series Analysis of Twitter","authors":"K. Ikeda, Gen Hattori, C. Ono, H. Asoh, T. Higashino","doi":"10.1109/WAINA.2013.113","DOIUrl":"https://doi.org/10.1109/WAINA.2013.113","url":null,"abstract":"This paper proposes a method for detecting service quality reduction at an early stage based on a linguistic and time series analysis of Twitter. Recently, many people post their opinions about products and service quality via social networking services, such as Twitter. The number of tweets related to service quality increases when service quality reductions such as communication failures and train delays occur. It is crucial for the service operators to recover service quality at an early stage in order to maintain customer satisfaction. Tweets can be considered as an important clue for detecting service quality reduction. In this paper, we propose a method for early detection of service quality reduction by making the best use of the Twitter platform, which includes tweets as text information and has a feature of real time communication. The proposed method consists of a linguistic analysis and time series analysis of tweets. In the linguistic analysis, semi-automatic method is proposed to construct a service specific dictionary, which is used to extract negative tweets related to the services with high accuracy. In the time series analysis, statistical modeling is used for the early and accurate anomaly detection from the time series of the negative tweets. The experimental results show that the extraction accuracy of negative tweets and the detection accuracy of service quality reduction are significantly improved.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131896247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Improving Secure Routing Protocols Using Additional Features 使用附加功能改进安全路由协议
J. Tornos, J. L. Salazar
{"title":"Improving Secure Routing Protocols Using Additional Features","authors":"J. Tornos, J. L. Salazar","doi":"10.1109/WAINA.2013.151","DOIUrl":"https://doi.org/10.1109/WAINA.2013.151","url":null,"abstract":"MANET routing protocols have to manage different problems from those of wired routing protocols. These protocols did not implement security, so it was necessary to implement secure protocols. Secure routing protocols do not usually take into account the impact of security into the performance of the original protocol. This article shows the results obtained after implementing one of these secure protocols, ADSR, both original protocol and optimized version. After an analysis of these results, we propose a change that improves the results of the ADSR protocol.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127399236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Feasibility Study on Using Low-Cost Gaming Devices for Rehabilitation 使用低成本游戏设备进行康复治疗的可行性研究
K. F. Li, A. Sevcenco
{"title":"A Feasibility Study on Using Low-Cost Gaming Devices for Rehabilitation","authors":"K. F. Li, A. Sevcenco","doi":"10.1109/WAINA.2013.262","DOIUrl":"https://doi.org/10.1109/WAINA.2013.262","url":null,"abstract":"Telerehabilitation has become a reality with the advances of communication and sensing technologies. The past decade has seen much research work done in rehabilitation using sophisticated devices and complex computations. A recent research trend has emerged with the proliferation of gaming devices and sensors. This work investigates rehabilitation of wrist and arm using the affordable Nintendo Wii Remote controller with an USB-equipped personal computer. Other gaming devices such as Microsoft's Kinect are discussed. The impact of positional displacement of the controller is examined. The sensitive of the controller with respect to prescribed motions is studied. Extensive experiments performed with various controllers, motions, and people are discussed. Conclusions are drawn on the suitability of using the Wii Remote controller in rehabilitation.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115389616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Comprehensive Study of Bluetooth Fingerprinting-Based Algorithms for Localization 基于蓝牙指纹定位算法的综合研究
Li Zhang, Xiao Liu, Jie Song, C. Gurrin, Zhiliang Zhu
{"title":"A Comprehensive Study of Bluetooth Fingerprinting-Based Algorithms for Localization","authors":"Li Zhang, Xiao Liu, Jie Song, C. Gurrin, Zhiliang Zhu","doi":"10.1109/WAINA.2013.205","DOIUrl":"https://doi.org/10.1109/WAINA.2013.205","url":null,"abstract":"There is an increasing demand for indoor navigation and localization systems along with the increasing popularity of location based services in recent years. According to past researches, Bluetooth is a promising technology for indoor wireless positioning due to its cost-effectiveness and easy-to-deploy feature. This paper studied three typical fingerprinting-based positioning algorithms - kNN, Neural Networks and SVM. According to our analysis and experimental results, the kNN regression method is proven to be a good candidate for localization in real-life application. Comprehensive performance comparisons including accuracy, precision and training time are presented.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117076256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Intercloud Architecture Framework for Heterogeneous Cloud Based Infrastructure Services Provisioning On-Demand 基于异构云的基础设施服务按需供应的云间架构框架
Y. Demchenko, C. Ngo, C. D. Laat, J. A. G. Espín, S. Figuerola, Juan Rodríguez Martinez, L. M. C. Murillo, G. Landi, N. Ciulli
{"title":"Intercloud Architecture Framework for Heterogeneous Cloud Based Infrastructure Services Provisioning On-Demand","authors":"Y. Demchenko, C. Ngo, C. D. Laat, J. A. G. Espín, S. Figuerola, Juan Rodríguez Martinez, L. M. C. Murillo, G. Landi, N. Ciulli","doi":"10.1109/WAINA.2013.237","DOIUrl":"https://doi.org/10.1109/WAINA.2013.237","url":null,"abstract":"This paper presents on-going research to develop the Intercloud Architecture Framework (ICAF) that addresses problems in multi-provider multi-domain heterogeneous cloud based infrastructure services and applications integration and interoperability, to allow their on-demand provisioning. The paper refers to existing standards and ongoing standardisation activity in Cloud Computing, in particular, recently published NIST Cloud Computing Reference Architecture (CCRA) and ITU-T JCA-Cloud activity. The proposed ICAF defines four complementary components addressing Intercloud integration and interoperability: multi-layer Cloud Services Model that combines commonly adopted cloud service models, such as IaaS, PaaS, SaaS, in one multilayer model with corresponding inter-layer interfaces, Intercloud Control and Management Plane that supports cloud based applications interaction, Intercloud Federation Framework, and Intercloud Operations Framework. The paper briefly describes the Service delivery and lifecycle management as an important ICAF component that provides a basis for consistent management and security of the provisioned on-demand complex cloud based services. The paper describes an implementation of the Intercloud Control and Management Plane in the GEYSERS project to allow optimal provisioning of the combined Network+IT resources in the inter-cloud environment. The proposed architecture is intended to provide an architectural model for developing Intercloud middleware and in this way will facilitate clouds interoperability and integration.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117276704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Mobile Digcovery: A Global Service Discovery for the Internet of Things 移动发现:物联网的全球服务发现
A. Jara, Pablo López, D. Fernández, Jose F. Castillo, M. A. Zamora, A. Gómez-Skarmeta
{"title":"Mobile Digcovery: A Global Service Discovery for the Internet of Things","authors":"A. Jara, Pablo López, D. Fernández, Jose F. Castillo, M. A. Zamora, A. Gómez-Skarmeta","doi":"10.1109/WAINA.2013.261","DOIUrl":"https://doi.org/10.1109/WAINA.2013.261","url":null,"abstract":"Internet of Things (IoT) enables a homogeneous and seamless machine to machine (M2M) between any Internet-enabled devices in the real world. IoT provides global communications, access to services and information for the development of Smart Cities, environmental monitoring, bus tracking and parking. For this purpose, IoT requires scalability, extensibility, and integration of emerging resources in order to reach a suitable ecosystem for data acquisition and interaction with the citizens. This work presents a way to interact with the IoT through a homogeneous and suitable mechanism for the global resource discovery of devices and sensors on different scenarios. For discovery purpose, a infrastructure called \"digcovery\" is defined for maximizing efficiency and sustainability of deployments offering the framework to allow users to register/include their own sensors into a common infrastructure, and access/discover the available resources through a mobile phone. This presents how to use the smartphone capabilities, in terms of identification, geo-location and context-awareness, to access and interact with the available resources that are surrounding us.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116375341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
A Recommendation Exchange Protocol between Smart Devices in Pervasive Computing Environment 普适计算环境下智能设备间的推荐交换协议
N. Iltaf, Abdul Ghafoor, Usman Zia
{"title":"A Recommendation Exchange Protocol between Smart Devices in Pervasive Computing Environment","authors":"N. Iltaf, Abdul Ghafoor, Usman Zia","doi":"10.1109/WAINA.2013.260","DOIUrl":"https://doi.org/10.1109/WAINA.2013.260","url":null,"abstract":"A framework to exchange structured recommendation information (Trust-AML) between smart devices in pervasive environment (Trust-AML) is proposed. The specification of Trust-AML is inspired by the design principles of other standard-izations and XML design guideline. A XML-over-UDP based recommendation exchange protocol is also proposed to share recommendation information between smart devices. Implementation of the proposed model on android smart phone using open services gateway initiative (OSGI) in presented to demonstrate the effectiveness of the protocol in pervasive computing environment.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124466747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信