{"title":"An Optimal Approach for Image Transmission in Multi-Rate Wireless Sensor Network","authors":"Honggang Wang, D. Peng, Wei Wang, H. Sharif","doi":"10.1109/AINA.2007.35","DOIUrl":"https://doi.org/10.1109/AINA.2007.35","url":null,"abstract":"Many sensor applications such as monitoring and surveillance may require image sensor array to conduct collaborative image transmissions in Wireless sensor network (WSN). The large size image transmission in WSN is a bottleneck due to the limited energy resources. In this paper, we propose an optimal scheme for image sensors to utilize inter-sensor correlations to decide transmission patterns based on a multi-rate least cost path (MRLCP) routing scheme, which achieves high energy efficiencies and longer network lifetime. This optimization scheme allows each image sensor to transmit optimal fractions of the overlapped images through appropriate rate- based routing paths. A specific genetic algorithm is designed to solve such discrete optimization problem. The simulation results show that the proposed image transmission scheme can achieve considerable gains in terms of the WSN energy efficiency and network lifetime extension.","PeriodicalId":361109,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications (AINA '07)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125053756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Tree-based Energy-Efficient Algorithm for Data-CentricWireless Sensor Networks","authors":"Y. Wen, F. Lin, Wen-Cheng Kuo","doi":"10.1109/AINA.2007.24","DOIUrl":"https://doi.org/10.1109/AINA.2007.24","url":null,"abstract":"The nature of wireless sensor networks make them suitable for a great variety of applications, especially over wide areas, or in remote or hostile locations; however, such environments make battery capacity an especially important concern, where replacing or recharging of batteries is in- feasible for one reason or another. Battery capacity restrictions on highly energy-constrained sensor networks can be mitigated, by adopting data-aggregation techniques and by managing the scheduling of nodes. These effectively reduce the overall amount of data transmitted, thereby conserving energy. In this paper, we address the construction of energy-efficient data-aggregation trees, an NP-problem, in different rounds of communication, seeking to maximize the lifetime of heterogeneous sensor networks. This problem is subject to constraints on such networks: battery capacity, data-sensing scheduling, and round calculation. We derive a near-optimal primal feasible solution using Lagrangean relaxation. The experimental results show that our proposed algorithm outperforms similar algorithms.","PeriodicalId":361109,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications (AINA '07)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125081687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Benslimane, Z. Maamar, Y. Taher, M. Lahkim, M. Fauvet, M. Mrissa
{"title":"A Multi-Layer and Multi-Perspective Approach to Compose Web Services","authors":"D. Benslimane, Z. Maamar, Y. Taher, M. Lahkim, M. Fauvet, M. Mrissa","doi":"10.1109/AINA.2007.16","DOIUrl":"https://doi.org/10.1109/AINA.2007.16","url":null,"abstract":"This paper presents a Web services composition approach that is built upon three layers known as component, community, and composite. The contribution of each layer towards this approach is assessed from two perspectives known as organization and management. Furthermore this paper discusses how Web services in a community are specialized into abstract and concrete. Interactions between abstract/- concrete Web services and composite Web services happen through a driver known as Open Service Connectivity. This driver permits first, binding any abstract Web service to any composite Web service and second, triggering any concrete Web service from any composite Web service.","PeriodicalId":361109,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications (AINA '07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130566599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Deqing Zou, L. Yang, Weizhong Qiang, Xueguang Chen, Zongfen Han
{"title":"An Authentication and Access Control Framework for Group Communication Systems in Grid Environment","authors":"Deqing Zou, L. Yang, Weizhong Qiang, Xueguang Chen, Zongfen Han","doi":"10.1109/AINA.2007.33","DOIUrl":"https://doi.org/10.1109/AINA.2007.33","url":null,"abstract":"Collaboration is used for information sharing and activity coordinating, and it exists broadly in many fields. Group communication enables efficient communication between a set of processes logically organized into groups and communicating via multicast in an asynchronous environment. One of the key technologies for collaborative applications is secure group communication. Current research on secure group communication scarcely considers the existing security mechanism in local systems. As a result, group communication systems couldn 't provide general support for collaborative applications running on a specific system. Based on the existing grid security technologies, we propose an authentication and access control framework at virtual organization (VO) level for group communication in grid environment. By introducing role-based access control (RBAC) and attribute-based approach, we define group management policies and design group control protocols. The protocols are analyzed from three aspects: compatibility, performance, and security. Finally, we implement a prototype based on GridShib.","PeriodicalId":361109,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications (AINA '07)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121114394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pervasive Service Composition in the Home Network","authors":"A. Bottaro, A. Gérodolle, P. Lalanda","doi":"10.1109/AINA.2007.112","DOIUrl":"https://doi.org/10.1109/AINA.2007.112","url":null,"abstract":"The home environment becomes ready to host distributed devices dynamically adapting to service availability and reacting to user location and user activity. Sensors, high definition rendering systems, home gateways, wired and wireless controllable equipments are now available. Many protocols enable connectivity and interaction between devices. However, challenges remain: protocol heterogeneity, interface fragmentation and device composition static aspect make self-organization and dynamic reconfiguration hardly achievable. This paper describes attractive scenarios at home which lead to the definition of the pervasive service composition requirements. A software architecture facing the mentioned challenges is proposed over OSGi. It first enables developers to implement distributed plug-n-play applications like a local one. It also delivers a service-oriented middleware allowing spontaneous distributed service composition to occur at runtime.","PeriodicalId":361109,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications (AINA '07)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126681338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Public Computing - Challenges and Solutions","authors":"Yi Pan","doi":"10.1109/AINA.2007.115","DOIUrl":"https://doi.org/10.1109/AINA.2007.115","url":null,"abstract":"Yi Pan is the chair and a professor in the Department of Computer Science and a professor in the Department of Computer Information Systems at Georgia State University. Dr. Pan received his B.Eng. and M.Eng. degrees in computer engineering from Tsinghua University, China, in 1982 and 1984, respectively, and his Ph.D. degree in computer science from the University of Pittsburgh, USA, in 1991.","PeriodicalId":361109,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications (AINA '07)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127359722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parallel Lossless Data Compression Based on the Burrows-Wheeler Transform","authors":"Jeff Gilchrist, A. Çuhadar","doi":"10.1109/AINA.2007.109","DOIUrl":"https://doi.org/10.1109/AINA.2007.109","url":null,"abstract":"In this paper, we present parallel algorithms for lossless data compression based on the Burrows-Wheeler transform (BWT) block-sorting technique. We investigate the performance of using data parallelism and task parallelism for both multi-threaded and message-passing programming. The output produced by the parallel algorithms is fully compatible with their sequential counterparts. To balance the workload among processors we develop a task scheduling strategy. An extensive set of experiments is performed with a shared memory NUMA system using up to 120 processors and on a distributed memory cluster using up to 100 processors. Our experimental results show that significant speedup can be achieved with both data parallel and task parallel methodologies. These algorithms will greatly reduce the amount of time it takes to compress large amounts of data while the compressed data remains in a form that users without access to multiple processor systems can still use.","PeriodicalId":361109,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications (AINA '07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127375565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Proxy-Based Integrated Cache Consistency and Mobility Management Scheme for Mobile IP Systems","authors":"Weiping He, I. Chen, Baoshan Gu","doi":"10.1109/AINA.2007.19","DOIUrl":"https://doi.org/10.1109/AINA.2007.19","url":null,"abstract":"In this paper, we investigate a proxy-based integrated cache consistency and mobility management scheme in mobile IP systems. Our scheme is based on a stateful strategy by which cache invalidation messages are asynchronously sent by the server to a mobile host (MH) whenever data objects cached at the MH have been updated. We use a per-user proxy to buffer invalidation messages to allow the MH to disconnect arbitrarily and to reduce the number of uplink requests when the MH is reconnected. Moreover, the MH's proxy serves as a gateway foreign agent (GFA) as in the MIP Regional Registration protocol to keep track of the address of the MH in a region. The proxy migrates with the MH when the MH crosses a regional area. We identify the optimal regional area size under which the overall network traffic cost, due to cache consistency management, mobility management, and query requests/replies, is minimized. We demonstrate that the integrated cache consistency and mobility management scheme outperforms both no-proxy and/or no-cache schemes in Mobile IPv6 environments.","PeriodicalId":361109,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications (AINA '07)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132554881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliable Strict Quality-of-Service with Unreserved Backup Paths","authors":"I. Chen, M. Ito","doi":"10.1109/AINA.2007.121","DOIUrl":"https://doi.org/10.1109/AINA.2007.121","url":null,"abstract":"Guaranteed, high-quality service in a computer network often requires a single reserved path. Such a path can easily suffer from single point failures. Thus, to continuously provide the same high-quality service guarantee both before and after a link failure, each flow requires both a reserved primary path and a backup path. One solution category involves eliminating resource reservation on the backup paths, and instead, computes a posteriori good unreserved backup paths to provide strict high quality service in the event of a link failure. This paper provides a solution (AvoidPBO-S) in this category that uses good unreserved backup paths to offer the same strict service guarantee despite a link failure. Initial test results show that there is only a very small likelihood that an unreserved AvoidPBO-S backup path fails to provide the kind of service guarantee as the primary path, and that AvoidPBO-S backup paths perform well compared to other methods.","PeriodicalId":361109,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications (AINA '07)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133537846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stepwise Log Summarizing Method for Real-Time Network Event Handling","authors":"M. Nagao, G. Kitagata, T. Suganuma, N. Shiratori","doi":"10.1109/AINA.2007.131","DOIUrl":"https://doi.org/10.1109/AINA.2007.131","url":null,"abstract":"In this paper, we propose a log summarizing method to help a network manager to recognize and handle a network event. Our method can accurately extract only necessary information in real-time by stepwise information extraction technique. This feature can help the network manager to handle an event quickly with less management burden. With our experimental results, we show that our method has the ability to remove more than 60% - 90% unnecessary records, without losing any necessary information. Additionally, our method can process a log containing massive records in real-time.","PeriodicalId":361109,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications (AINA '07)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130489817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}