2014 Global Information Infrastructure and Networking Symposium (GIIS)最新文献

筛选
英文 中文
Provisioning delay effect of partaking a Trusted Third Party in a vehicular cloud 车辆云中参与可信第三方的供应延迟效应
2014 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2014-10-23 DOI: 10.1109/GIIS.2014.6934269
M. Aloqaily, B. Kantarci, H. Mouftah
{"title":"Provisioning delay effect of partaking a Trusted Third Party in a vehicular cloud","authors":"M. Aloqaily, B. Kantarci, H. Mouftah","doi":"10.1109/GIIS.2014.6934269","DOIUrl":"https://doi.org/10.1109/GIIS.2014.6934269","url":null,"abstract":"Vehicular cloud computing has appeared as a viable mobile cloud computing solution of vehicle communications. Among several challenges in such environment, provisioning delay can be counted as a crucial challenge to be addressed. In this paper, we propose a framework of partaking a Trusted Third Party (TTP) in a vehicular cloud. This framework can aid in pinpoint of such problem and to address such challenge in a vehicular cloud based on user's experience. Thus, provisioning delay is obtained via other mobile nodes and re-formulated by a weighted combination of these delays. We evaluate our proposal via simulations, and numerical results has been presented.","PeriodicalId":392180,"journal":{"name":"2014 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130987577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Towards a modular and flexible SDN control language 朝着模块化和灵活的SDN控制语言迈进
2014 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2014-10-23 DOI: 10.1109/GIIS.2014.6934254
M. Aouadj, E. Lavinal, T. Desprats, M. Sibilla
{"title":"Towards a modular and flexible SDN control language","authors":"M. Aouadj, E. Lavinal, T. Desprats, M. Sibilla","doi":"10.1109/GIIS.2014.6934254","DOIUrl":"https://doi.org/10.1109/GIIS.2014.6934254","url":null,"abstract":"Software Defined Networking (SDN) is a recent paradigm that aims to reshape the way we configure and manage today's networks. To fulfill this goal, SDN relies on control languages to programmatically express the desired network behavior, making it possible to quickly change and innovate within the network. As a consequence, having an expressive and powerful control language will unlock the full potential of this approach and enable new opportunities for developing network control applications. As such, numerous works addressed this issue, where the most recent ones have used network abstractions in order to spare administrators from dealing with the complex and dynamic nature of the physical infrastructure. However, we think that these languages rely on abstractions that are not the most appropriate ones for expressing modular and reusable control policies. In this paper, we present work in progress towards a new high-level, modular and flexible SDN control language. One novelty of this language is to integrate a network abstraction model that allows a clear separation between simple transport functions and richer network services. We believe that this approach will allow administrators to design and deploy control applications that can be easily maintained and reused.","PeriodicalId":392180,"journal":{"name":"2014 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127834691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving the stability in overlay and native networks 提高覆盖网络和本地网络的稳定性
2014 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2014-10-23 DOI: 10.1109/GIIS.2014.6934275
Jun Gong, J. Liao, Jingyu Wang, Q. Qi, Di Yang, Min Feng
{"title":"Improving the stability in overlay and native networks","authors":"Jun Gong, J. Liao, Jingyu Wang, Q. Qi, Di Yang, Min Feng","doi":"10.1109/GIIS.2014.6934275","DOIUrl":"https://doi.org/10.1109/GIIS.2014.6934275","url":null,"abstract":"The objective of overlay routing is to minimize the latency of overlay users, while the objective of traffic engineering is to minimize the maximum link utilization of overall network. Thus, there exists the interaction between overlay routing and traffic engineering in the multi-layer network topology, which may lead to endless routing oscillations and performance degradation in the network. In order to solve the oscillation problem, we propose an alternative-offers bargaining model to investigate the interaction process. We view each route of two players as an offer. With the knowledge from the previous round, two strategies are introduced in each offer to weaken the inevitable conflict between two players. The simulation results show that our proposed strategies can improve the default interaction and achieve satisfactory results at the stable state.","PeriodicalId":392180,"journal":{"name":"2014 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129059623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The “Object-as-a-Service” paradigm “对象即服务”范式
2014 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2014-09-15 DOI: 10.1109/GIIS.2014.6934281
Sylvain Cherrier, Y. Ghamri-Doudane
{"title":"The “Object-as-a-Service” paradigm","authors":"Sylvain Cherrier, Y. Ghamri-Doudane","doi":"10.1109/GIIS.2014.6934281","DOIUrl":"https://doi.org/10.1109/GIIS.2014.6934281","url":null,"abstract":"The increasing interest about the Internet of Things (IoT) is almost as remarkable than its practical absence in our everyday lives. Announced as the new breakthrough in IT industry, the domain is characterized by a large number of architecture propositions that are in charge of providing a structure for applications creation. These architectures are needed because of the heterogeneity of stakeholders involved in IoT Applications. Programming languages, operating systems, hardware specificities, processing power, memory, network organization, characteristics, constraints, the world of IoT is so diverse. Furthermore, these architectures should provide an easy access to users that are not aware of IT technologies involved. The Services Oriented Computing (SOC) has shown in the past its relevance to the decoupling constraints interoper-ability among stakeholders. The composition of loosely coupled services facilitates the integration of very varied elements and provides agility in the creation of new applications. But unlike the approach inherited from the SOC in pre-existing services are composed to obtain a specific application, we propose a more dynamic notion of service. Our “Object-as-a-Service” point of view is based on the notion of building dynamically the service needed on each Object and then integrate it in the whole composition. This paper focus on the gain of this approach for the IoT by promoting the “Object-as-a-Service” paradigm as a basis for the creation of dynamic and agile user-made applications.","PeriodicalId":392180,"journal":{"name":"2014 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129677194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A Gaussian mixture model for dynamic detection of abnormal behavior in smartphone applications 智能手机应用中异常行为动态检测的高斯混合模型
2014 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2014-09-01 DOI: 10.1109/GIIS.2014.6934278
Ali El Attar, R. Khatoun, Marc Lemercier
{"title":"A Gaussian mixture model for dynamic detection of abnormal behavior in smartphone applications","authors":"Ali El Attar, R. Khatoun, Marc Lemercier","doi":"10.1109/GIIS.2014.6934278","DOIUrl":"https://doi.org/10.1109/GIIS.2014.6934278","url":null,"abstract":"Nowadays smartphones get increasingly popular which also attracted hackers. With the increasing capabilities of such phones, more and more malicious softwares targeting these devices have been developed. Malwares can seriously damage an infected device within seconds. This paper focus on the aggregation of a popular probabilistic model: the Gaussian mixture model, for a dynamic detection of the abnormal behavior in smartphone applications. More precisely, we propose to apply a mixture model estimation technique on the behavior of applications, for density modeling and data clustering. The mixture models of the different smartphones are then aggregated to estimate the global model that reflecting the probability density of the global data set. Furthermore, we carry out a model-based clustering outlier detection to compute an anomaly score for each application, leading to identify the malware applications. Initial experiments results prove the efficiency and the accuracy of the model-based clustering in detecting abnormal applications with a low false alerts rate.","PeriodicalId":392180,"journal":{"name":"2014 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"325 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134056016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Traffic classification with on-line ensemble method 基于在线集成方法的流量分类
2014 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2014-09-01 DOI: 10.1109/GIIS.2014.6934280
E. N. Souza, S. Matwin, S. Fernandes
{"title":"Traffic classification with on-line ensemble method","authors":"E. N. Souza, S. Matwin, S. Fernandes","doi":"10.1109/GIIS.2014.6934280","DOIUrl":"https://doi.org/10.1109/GIIS.2014.6934280","url":null,"abstract":"Traffic classification helps network managers to control services and activities done by users. Traditionally, Machine Learning (ML) is a tool to help managers to detect applications most used, and offer different types of services to their clients. Most of ML algorithms are designed to deal with limited amount of data, and in network context this is a problem, because of large data volume, speed and diversity. More recent work try to solve this issue by using ML algorithms developed to work with data streams, but they tend to implement only Very Fast Decision Trees (VFDT). This work goes in a different direction by proposing to use Ensemble Learners (EL), which, theoretically, offer more capability to deal with non-linear problems. The paper proposes to use a new EL called OzaBoost Dynamic (OzaDyn), and compares its performance with other ensemble methods designed to deal with data streams. Results indicate that the accuracy performance of OzaDyn is equal to other ensemble methods, while it helps reduce the memory consumption and time to evaluate the models.","PeriodicalId":392180,"journal":{"name":"2014 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123287738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Simple subroutine for inhomogeneous deployment 非同构部署的简单子例程
2014 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2014-09-01 DOI: 10.1109/GIIS.2014.6934284
Mouhamed Abdulla
{"title":"Simple subroutine for inhomogeneous deployment","authors":"Mouhamed Abdulla","doi":"10.1109/GIIS.2014.6934284","DOIUrl":"https://doi.org/10.1109/GIIS.2014.6934284","url":null,"abstract":"Spatial modeling of wireless networks via analytical means has been considered as a widely practiced mechanism for inference. As a result, some geometrical deployment models have been proposed in literature. Although practical in certain simulation instances, these models do not always produce inhomogeneous nodal geometries in an effective and simple manner for particular deployment situations. Therefore, we conceptualized a flexible approach for realizing random inhomogeneity by proposing the area-specific deployment (ASD) algorithm, which takes into account the clustering tendency of users. Overall, the developed spatial-level network tool has the distinct advantage of automatically producing infinitely many random realizations of users' geometry by simply entering three parameters to the simulator: the size of the cellular network, the number of deployment layers, and the overall quantity of nodes.","PeriodicalId":392180,"journal":{"name":"2014 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121380246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信