2017 IEEE International Conference on Computer and Information Technology (CIT)最新文献

筛选
英文 中文
Where Resources Meet at the Edge 资源的边缘在哪里
Klervie Toczé, S. Nadjm-Tehrani
{"title":"Where Resources Meet at the Edge","authors":"Klervie Toczé, S. Nadjm-Tehrani","doi":"10.1109/CIT.2017.60","DOIUrl":"https://doi.org/10.1109/CIT.2017.60","url":null,"abstract":"Edge computing is a recent paradigm where network nodes are placed close to the end users, at the edge of the network. Efficient management of resources within this configuration is crucial due to scarcity and geographical spreading of edge resources. We begin by a brief description of the edge paradigm, the most generic edge architecture, and the terminology associated to it. Then, we propose and elaborate on a preliminary taxonomy for edge resource management, together with a substantial review of works in the area. Finally, we identify some research challenges.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115718817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Assessment of TCP Parameters for Mobile Devices Concerning Performance and Energy Consumption 基于性能和能耗的移动设备TCP参数评估
Jonas Pontes, Demetrio Borges, Eric Borba, Victor Lira, E. Tavares
{"title":"Assessment of TCP Parameters for Mobile Devices Concerning Performance and Energy Consumption","authors":"Jonas Pontes, Demetrio Borges, Eric Borba, Victor Lira, E. Tavares","doi":"10.1109/CIT.2017.51","DOIUrl":"https://doi.org/10.1109/CIT.2017.51","url":null,"abstract":"Mobile devices have become quite popular, and they are responsible for a significant part of Internet traffic. In these devices, multimedia services, such as video streaming over HTTP, are commonly adopted, and TCP protocol is the standard to assure reliable data transmission. To deal with applications that require higher bandwidth, several modifications were made on TCP, and they are called extensions for high performance. For instance, these extensions allow a better utilization of network bandwidth offered by high-speed network technologies, such as WCDMA (3G) and LTE (4G). Changes in network technologies and TCP parameters may solve performance issues, but this modification may increase energy consumption (which considerably impacts mobile devices). This paper presents a performance and energy consumption evaluation of network technology and TCP/IP parameters for mobile devices. We utilize video streaming over HTTP as the workload, and results indicate some TCP parameters may influence energy consumption as well as performance.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125390854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Subspace Decomposition Channel Estimation for Multiple Virtual MIMO SC-FDMA Systems 多虚拟MIMO SC-FDMA系统的子空间分解信道估计
A. Tahat, C. D’amours, B. Champagne
{"title":"Subspace Decomposition Channel Estimation for Multiple Virtual MIMO SC-FDMA Systems","authors":"A. Tahat, C. D’amours, B. Champagne","doi":"10.1109/CIT.2017.56","DOIUrl":"https://doi.org/10.1109/CIT.2017.56","url":null,"abstract":"In this paper, we investigate the use of a subspace decomposition MIMO channel estimation algorithm for the blind estimation of the multiple virtual MIMO (V-MIMO) channels in Single Carrier Frequency Division Multiple Access (SC-FDMA) systems in order to increase its spectral efficiency. Groups of multiplexed users are formed, where each user is equipped with a single antenna, to transmit on the same frequency and time resources. When deployed in a V-MIMO system that resembles the LTE standard parameters, the proposed blind algorithm can obtain accurate estimates of the V-MIMO channels for each active user over every block of transmitted data. In addition, it is necessary to have knowledge of the channels state information to perform the users grouping and frequency allocation (scheduling). According to the LTE standard, sounding reference signals are employed in conjugation with Interleaved-frequency division multiple-access (I-FDMA). By eliminating the need to transmit an entire block of pilot symbols for each active transmitter, this permits for additional bandwidth efficiency in V-MIMO SC-FDMA systems in which multiple users occupy the same set of subcarriers as indicated by the LTE standard. The advantages of employing our proposed blind subspace-based channel estimation algorithm are verified by simulations results over fading channels, which demonstrate its practicality for use in the resulting V-MIMO SC-FDMA scheme with reduced training.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125408394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
“You have a Potential Hacker’s Infection”: A Study on Technical Support Scams “你有一个潜在的黑客感染”:技术支持诈骗研究
Sampsa Rauti, V. Leppänen
{"title":"“You have a Potential Hacker’s Infection”: A Study on Technical Support Scams","authors":"Sampsa Rauti, V. Leppänen","doi":"10.1109/CIT.2017.32","DOIUrl":"https://doi.org/10.1109/CIT.2017.32","url":null,"abstract":"Technical support scams have become more prevalent and turned into a profitable business. We engage 10 technical support scammers from different fake support sites via a live chat and study what kinds of actions they take once we let them control our machine over a remote connection. We then provide a qualitative analysis on the main characteristics of technical support scams that have received little scientific attention until recently.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115205613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Antenna Array Based Localization Scheme for Vehicular Networks 基于天线阵列的车载网络定位方案
M. A. M. Marinho, A. Vinel, F. Antreich, J. Costa, E. P. Freitas
{"title":"Antenna Array Based Localization Scheme for Vehicular Networks","authors":"M. A. M. Marinho, A. Vinel, F. Antreich, J. Costa, E. P. Freitas","doi":"10.1109/CIT.2017.64","DOIUrl":"https://doi.org/10.1109/CIT.2017.64","url":null,"abstract":"Vehicular ad hoc networks (VANETs) are emerging as the possible solution for multiple concerns in road traffic such as mobility and safety. One of the main concerns present in VANETs is the localization and tracking of vehicles. This work presents a passive vehicle localization and tracking method based on direction of arrival (DOA) estimation. The proposed method does not rely on external sources of information such as Global Navigation Satellite Systems (GNSS) and can be used to mitigate the possibility of spoofing or to provide a second independent source of position estimation for integrity purposes. The proposed algorithm uses array signal processing techniques to estimate not only the position but also the direction of other vehicles in network. Furthermore, it is a fully passive method and can alleviate the network load since it does not require any location based data exchange and can be performed by any listening vehicle using the signal of any data transmission. A set of numerical simulations is used to validate the proposed method and the results are shown to be more precise than the average accuracy of Global Position System (GPS) receivers.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124724288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Investigation and Performance Evaluation of Scalable High Efficiency Video Coding 可扩展高效视频编码的研究与性能评价
Wei-Lune Tang, Shih-Hsuan Yang
{"title":"Investigation and Performance Evaluation of Scalable High Efficiency Video Coding","authors":"Wei-Lune Tang, Shih-Hsuan Yang","doi":"10.1109/CIT.2017.26","DOIUrl":"https://doi.org/10.1109/CIT.2017.26","url":null,"abstract":"The rapid growth of the volume of multimedia data necessitates efficient compression and transmission of videos, which are requested in divergent bitrates owing to the diverse network bandwidth constraints or end device resolution/complexity requirements. Scalable video coding (SVC) is a coding paradigm that allows once-encoded video to be adapted to any desired bitrate or quality level, and thus saves the transmission and storage cost. The state-of-the-art video coding standards H.264 and HEVC incorporate scalable coding as an important extension (H.264 SVC and SHVC). In this study, we comprehensively investigated the rate-distortion and computational-complexity performance of SHVC versus H.264 SVC and wherein four typical scalability configurations were explored. Compared to H.264 SVC, SHVC achieves the same visual quality with approximately one half bitrate, higher encoding complexity and lower decoding complexity. For the selection of spatial scalability and quality scalability under a bitrate constraint, it is suggested to encode a video sequence in higher resolution followed by downsizing to the required resolution instead of direct encoding in lower resolution.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130616008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using Game Theory to Solve the Fault Diagnosis Problem under Symmetric Comparison Rules 用博弈论解决对称比较规则下的故障诊断问题
M. Elhadef
{"title":"Using Game Theory to Solve the Fault Diagnosis Problem under Symmetric Comparison Rules","authors":"M. Elhadef","doi":"10.1109/CIT.2017.21","DOIUrl":"https://doi.org/10.1109/CIT.2017.21","url":null,"abstract":"In this paper, we contribute in solving the systemlevel fault diagnosis (SLD) problem under the symmetric invalidation rules. The SLD aims at determining faulty nodes based on an input syndrome that is generated comparing the outputs from the different nodes. The symmetric comparison diagnosis model assumes that tasks are assigned to pairs of nodes and the results of executing these tasks are compared. Fault nodes are identified based on the agreements and disagreements among the nodes’ outputs. A limit t is assumed on the maximum number of nodes that can fail simultaneously. Various diagnosis algorithms have been developed in the last decades, but the problem of efficiently identifying the set of faulty units of a diagnosable system remained an outstanding research issue. This work introduces a new diagnosis approach for the symmetricbased comparison diagnosis problem using game theory. In this approach, faulty nodes are identified by maximizing the payoffs of all players (nodes). We have tested the new diagnosis approach using randomly generated diagnosable systems under even extreme faulty situations in which the limit t was set close to the number of nodes. The extensive simulations we have conducted proved the efficiency of the new game-theory-based diagnosis algorithm as it succeeded in guessing the fault status all nodes in all faulty situations.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132694428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Malware Detection Using API Similarity 使用API相似性的动态恶意软件检测
E. M. Alkhateeb
{"title":"Dynamic Malware Detection Using API Similarity","authors":"E. M. Alkhateeb","doi":"10.1109/CIT.2017.14","DOIUrl":"https://doi.org/10.1109/CIT.2017.14","url":null,"abstract":"Hackers create different types of Malware such as Trojans which they use to steal user-confidential information (e.g. credit card details) with a few simple commands, recent malware however has been created intelligently and in an uncontrolled size, which puts malware analysis as one of the top important subjects of information security. This paper proposes an efficient dynamic malware-detection method based on API similarity. This proposed method outperform the traditional signature-based detection method. The experiment evaluated 197 malware samples and the proposed method showed promising results of correctly identified malware.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124274193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Novel Model for Cybersecurity Economics and Analysis 网络安全经济学与分析的新模型
Paresh Rathod, T. Hämäläinen
{"title":"A Novel Model for Cybersecurity Economics and Analysis","authors":"Paresh Rathod, T. Hämäläinen","doi":"10.1109/CIT.2017.65","DOIUrl":"https://doi.org/10.1109/CIT.2017.65","url":null,"abstract":"In recent times, major cybersecurity breaches and cyber fraud had huge negative impact on victim organisations. The biggest impact made on major areas of business activities. Majority of organisations facing cybersecurity adversity and advanced threats suffers from huge financial and reputation loss. The current security technologies, policies and processes are providing necessary capabilities and cybersecurity mechanism to solve cyber threats and risks. However, current solutions are not providing required mechanism for decision making on impact of cybersecurity breaches and fraud. In this paper, we are reporting initial findings and proposing conceptual solution. The paper is aiming to provide a novel model for Cybersecurity Economics and Analysis (CEA). We will contribute to increasing harmonization of European cybersecurity initiatives and reducing fragmented practices of cybersecurity solutions and also helping to reach EU Digital Single Market goal. By introducing Cybersecurity Readiness Level Metrics the project will measure and increase effectiveness of cybersecurity programs, while the cost-benefit framework will help to increase the economic and financial viability, effectiveness and value generation of cybersecurity solutions for organisation's strategic, tactical and operational imperative. The ambition of the research development and innovation (RDI) is to increase and re-establish the trust of the European citizens in European digital environments through practical solutions.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124347398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An Efficient Dynamic Ridesharing Algorithm 一种高效的动态拼车算法
Jianren Gao, Yuxin Wang, Haoyang Tang, Zhao Yin, Lei Ni, Yanming Shen
{"title":"An Efficient Dynamic Ridesharing Algorithm","authors":"Jianren Gao, Yuxin Wang, Haoyang Tang, Zhao Yin, Lei Ni, Yanming Shen","doi":"10.1109/CIT.2017.33","DOIUrl":"https://doi.org/10.1109/CIT.2017.33","url":null,"abstract":"In this paper, we propose a scheduling algorithm for ridesharing. It efficiently serves real-time requests sent by passengers and generates ride sharing schedules that try to meet users' demands. In our method, we first propose a taxi searching algorithm using binary search strategy to quickly and efficiently retrieve candidate taxis that are likely to satisfy a trip request. A scheduling algorithm is then proposed. It checks each candidate taxi and insert the request trip into the schedule of the taxi which satisfies the request with the maximum average satisfaction. We evaluated our system using a large scale taxi dataset containing 101,952 trips in Beijing Chaoyang district. Results showed that our approach serves 40% additional taxi users while saving 30% travel distance compared with no-ridesharing.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125936105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信