Péter Vingelmann, F. Fitzek, M. Pedersen, J. Heide, H. Charaf
{"title":"Synchronized multimedia streaming on the iPhone platform with network coding","authors":"Péter Vingelmann, F. Fitzek, M. Pedersen, J. Heide, H. Charaf","doi":"10.1109/MCOM.2011.5783997","DOIUrl":"https://doi.org/10.1109/MCOM.2011.5783997","url":null,"abstract":"This paper presents the implementation of synchronized multimedia streaming for the Apple iPhone platform. The idea is to stream multimedia content from a single source to multiple receivers with direct or multi-hop connections to the source. First we look into existing solutions for video streaming on the iPhone for point-to-point architectures. After acknowledging their limitations, we propose a solution based on network coding to efficiently and reliably deliver the multimedia content to many devices in a synchronized manner. Then we introduce an application that implements this technique on the iPhone. We also present our testbed which consists of 16 iPod Touch devices to showcase the capabilities of our application.","PeriodicalId":367663,"journal":{"name":"2011 IEEE Consumer Communications and Networking Conference (CCNC)","volume":" 21","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114053323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SIP overload control testbed: Design, building and validation tests","authors":"Antoine Roly, L. Schumacher","doi":"10.1109/CCNC.2011.5766460","DOIUrl":"https://doi.org/10.1109/CCNC.2011.5766460","url":null,"abstract":"This paper1 presents the first steps of our work related to overload control techniques. These techniques are currently under development in the SIP Overload Control (SOC) Internet Engineering Task Force (IETF) Working Group (WG). A preliminary step to this work is to build a realistic test environment.","PeriodicalId":367663,"journal":{"name":"2011 IEEE Consumer Communications and Networking Conference (CCNC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115121081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Abbate, M. Avvenuti, Guglielmo Cola, P. Corsini, J. Light, Alessio Vecchio
{"title":"Recognition of false alarms in fall detection systems","authors":"S. Abbate, M. Avvenuti, Guglielmo Cola, P. Corsini, J. Light, Alessio Vecchio","doi":"10.1109/CCNC.2011.5766464","DOIUrl":"https://doi.org/10.1109/CCNC.2011.5766464","url":null,"abstract":"Falls are a major cause of hospitalization and injury-related deaths among the elderly population. The detrimental effects of falls, as well as the negative impact on health services costs, have led to a great interest on fall detection systems by the health-care industry. The most promising approaches are those based on a wearable device that monitors the movements of the patient, recognizes a fall and triggers an alarm. Unfortunately such techniques suffer from the problem of false alarms: some activities of daily living are erroneously reported as falls, thus reducing the confidence of the user. This paper presents a novel approach for improving the detection accuracy which is based on the idea of identifying specific movement patterns into the acceleration data. Using a single accelerometer, our system can recognize these patterns and use them to distinguish activities of daily living from real falls; thus the number of false alarms is reduced.","PeriodicalId":367663,"journal":{"name":"2011 IEEE Consumer Communications and Networking Conference (CCNC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127483927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-user support in next generation wireless LAN","authors":"Chunhui Zhu, Youngsoo Kim, O. Aboul-Magd, C. Ngo","doi":"10.1109/CCNC.2011.5766347","DOIUrl":"https://doi.org/10.1109/CCNC.2011.5766347","url":null,"abstract":"For the first time in the WLAN technology, multi-user downlink transmission will be made possible by the upcoming IEEE standard, 802.11ac. In this paper, we will report its current status, focusing on the MAC modifications and enhancements that are necessary to support the unique feature of downlink multi-user MIMO transmission. Specifically, the technique of TXOP sharing and its related issues and solutions will be discussed and illustrated.","PeriodicalId":367663,"journal":{"name":"2011 IEEE Consumer Communications and Networking Conference (CCNC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124707409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An implementation of Media Independent Information Services for the Network Simulator NS-2","authors":"J. Arraez, M. Esseghir, L. Merghem","doi":"10.1109/CCNC.2011.5766519","DOIUrl":"https://doi.org/10.1109/CCNC.2011.5766519","url":null,"abstract":"One of the most promising frameworks to handle mobility management in wireless heterogeneous networks is the Media Independent Handover (MIH) standard. Among the services MIH is providing to achieve efficient mobility management, Information Services allow data exchanging between heterogeneous network nodes. In this paper, we propose an implementation of this Media Independent Information Services (MIIS) on Network Simulator 2 (NS2). With this implementation, new mobility and handoff scenarios can be realized. As an example, we study the case where a mobile node gathers relevant data of nearby networks through only one interface while keeping the others disconnected in order to save battery power. Results show that our implementation is fully functional and demonstrate how useful can be MIIS for mobility management.","PeriodicalId":367663,"journal":{"name":"2011 IEEE Consumer Communications and Networking Conference (CCNC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125912363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of amplify-and-forward cooperative relaying with adaptive modulation in Nakagami-m fading channels","authors":"A. Annamalai, B. Modi, R. Palat","doi":"10.1109/CCNC.2011.5766344","DOIUrl":"https://doi.org/10.1109/CCNC.2011.5766344","url":null,"abstract":"This article investigates the efficacy of a constant-power, rate-adaptive M-QAM transmission technique in amplify-and-forward cooperative wireless networks. Tight upper and lower bounds are derived for the mean achievable spectral efficiency, outage probability, and error probability performance of non-regenerative cooperative relay networks in Nakagami-m fading environments. We observe that the spectral efficiency of a practical discrete-rate MQAM comes within a constant gap of the theoretical ergodic capacity of that channel, although this gap is smaller for an adaptive continuous-rate M-QAM.","PeriodicalId":367663,"journal":{"name":"2011 IEEE Consumer Communications and Networking Conference (CCNC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125463308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Roberto Roverso, A. Naiem, Mohammed Reda, M. El-Beltagy, Sameh El-Ansary, Nils Franzen, Seif Haridi
{"title":"On the feasibility of centrally-coordinated Peer-to-Peer live streaming","authors":"Roberto Roverso, A. Naiem, Mohammed Reda, M. El-Beltagy, Sameh El-Ansary, Nils Franzen, Seif Haridi","doi":"10.1109/CCNC.2011.5766328","DOIUrl":"https://doi.org/10.1109/CCNC.2011.5766328","url":null,"abstract":"In this paper we present an exploration of central coordination as a way of managing P2P live streaming overlays. The main point is to show the elements needed to construct a system with that approach. A key element in the feasibility of this approach is a near real-time optimization engine for peer selection. Peer organization in a way that enables high bandwidth utilization plus optimized peer selection based on multiple utility factors make it possible to achieve large source bandwidth savings and provide high quality of user experience. The benefits of our approach are also seen most when NAT constraints come into play.","PeriodicalId":367663,"journal":{"name":"2011 IEEE Consumer Communications and Networking Conference (CCNC)","volume":"54 67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126736972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust and discriminative image authentication based on sparse coding","authors":"Luntian Mou, Tiejun Huang, Yonghong Tian, Shiguo Lian, Xilin Chen","doi":"10.1109/CCNC.2011.5766482","DOIUrl":"https://doi.org/10.1109/CCNC.2011.5766482","url":null,"abstract":"Image authentication is usually approached by checking the preservation of some invariant features, which are expected to be both robust and discriminative so that content-preserving operations are accepted while content-altering manipulations are rejected. However, most of existing features have not obtained convincing performance due to insufficiency of experiments and over biasing of robustness. Motivated by the sparse coding strategy discovered in primary visual cortex, we explore the possibility of using sparse coding coefficients for image authentication. Through extensive experiments, we discover that the proposed feature bears great discrimination as well as robustness, which indicates the effectiveness of sparse coding as a new invariant feature for image authentication.","PeriodicalId":367663,"journal":{"name":"2011 IEEE Consumer Communications and Networking Conference (CCNC)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122754222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ki-dong Nam, Sungkee Noh, Soochang Park, Hosung Park, Sang-Ha Kim
{"title":"Reliable continuous objects detection algorithm in wireless sensor networks","authors":"Ki-dong Nam, Sungkee Noh, Soochang Park, Hosung Park, Sang-Ha Kim","doi":"10.1109/CCNC.2011.5766589","DOIUrl":"https://doi.org/10.1109/CCNC.2011.5766589","url":null,"abstract":"In wireless sensor networks, reliable event detection is one of the most important research issues. For the reliable event detection, existing studies usually assume that events are individual objects such as tanks, people, and animals. The existing studies estimate detection reliability of an individual object by the ratio of the number of successfully received data packets at a sink to the number of data packets determined by applications for reliable detection. Recently, detection of the other one kind of events, called the continuous object, such as wild fire and bio-chemical material has been receiving increased attention. Unlike the individual objects, a continuous object might cover a wide area and it could dynamically alter its own shape according to physical environments, e.g. wind, geographical features, and so on. Hence, the continuous object detection reliability can not be estimated by the indicator for the individual objects. In this paper we newly define the reliability indicator for continuous object detection. Then, we propose error recovery and revision scheme based on the estimation result from the novel indicator. Simulation results prove that the proposed scheme provides high reliability with respect to continuous object detection.","PeriodicalId":367663,"journal":{"name":"2011 IEEE Consumer Communications and Networking Conference (CCNC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122119974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Load Balancing Algorithm for multi-homing mobile nodes in local domain","authors":"Feng Zhong, C. Yeo, Bu-Sung Lee","doi":"10.1109/CCNC.2011.5766517","DOIUrl":"https://doi.org/10.1109/CCNC.2011.5766517","url":null,"abstract":"In a wireless domain where a mobile user accesses heterogeneous wireless technologies with multiple interfaces, a multi-path scheduling algorithm can benefit mobile users' experience by aggregating different network bandwidth together. However, existing literature actually shows that for TCP flows, it may not be the case. To better exploit multi-path scheduling for TCP connections, this paper presents a multi-path scheduling algorithm named Adaptive Load Balancing Algorithm (ALBAM) to split traffic across different network access for these multi-homed users. Unlike other multi-path scheduling algorithms, ALBAM takes full advantage of the infrastructure of wireless domain and it has the following advantages: (1) it does not involve any upgrade of protocol stack on user devices. (2) ALBAM does not introduce any protocol signaling cost into the bandwidth-constrained wireless networks. (3) ALBAM reduces the number of out-of-order packets. Thus, ALBAM improves the throughput of the TCP connections. To evaluate the performance of ALBAM, we conduct comparative simulations of ALBAM against a related technique, i.e. Opportunistic Multipath Scheduling. The results show that ALBAM can achieve good bandwidth aggregation and provide better performance to TCP connections in the wireless domain.","PeriodicalId":367663,"journal":{"name":"2011 IEEE Consumer Communications and Networking Conference (CCNC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117021967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}