2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)最新文献

筛选
英文 中文
A game theoretic study of attack and defense in cyber-physical systems 网络物理系统攻击与防御的博弈论研究
2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928904
Chris Y. T. Ma, N. Rao, David K. Y. Yau
{"title":"A game theoretic study of attack and defense in cyber-physical systems","authors":"Chris Y. T. Ma, N. Rao, David K. Y. Yau","doi":"10.1109/INFCOMW.2011.5928904","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928904","url":null,"abstract":"Cyber-physical systems encompass a wide range of systems such as sensor networks, cloud computing complexes, and communication networks. They require both the cyber and physical components to function, and hence are susceptible to attacks on either. A cyber-physical system is characterized by the physical space that represents physical components, and the cyber space that represents computations and communications. In this paper, we present a number of game theoretic formulations of attack and defense aspects of cyber-physical systems under different cost and benefit functions and different budgets of the attacker and defender. We discuss the outcomes of the underlying game under linear, negative exponential, and S-shaped benefit functions. We show that the outcomes are determined by the Nash Equilibria (which sometimes occur at budget limits), which in turn determine the system survival.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127494412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Adaptive scheduling for wireless video transmission in high-speed networks 高速网络中无线视频传输的自适应调度
2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928803
Zheng Wan, N. Xiong, N. Ghani, M. Peng, A. Vasilakos, Liang Zhou
{"title":"Adaptive scheduling for wireless video transmission in high-speed networks","authors":"Zheng Wan, N. Xiong, N. Ghani, M. Peng, A. Vasilakos, Liang Zhou","doi":"10.1109/INFCOMW.2011.5928803","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928803","url":null,"abstract":"With the increase of wireless bandwidth, wireless video applications become more and more popular. A high speed core network is needed for large-scale applications to collect video from wireless terminals in a distributed way. It is necessary to guarantee video transmission in wireless networks because video data should be firstly transmitted via wireless channel. Since wireless bandwidth is still limited and fluctuates frequently, it is difficult to protect wireless video transmission. In this paper, we propose an adaptive cross layer scheduling schema to reduce video transmission distortion in IEEE 802.11e networks. Firstly, it is preferred to insert each video frame into the access category (AC) with minimum relative queuing delay to reduce transmission delay. Secondly, a dynamic frame assignment algorithm (DFAA) is proposed to guarantee the transmission of high priority frames efficiently, with the constraint of limited bandwidth. Finally, each parameter of DFAA is equipped with a fuzzy logic controller which can produce appropriate adjustment to reply quickly to the variation of video data rate, coding structure and network load. Extensive simulation results are presented to validate the effectiveness of our proposed scheme.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130148887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
StorNet: Co-scheduling of end-to-end bandwidth reservation on storage and network systems for high-performance data transfers StorNet:存储系统和网络系统的端到端带宽预留协同调度,用于高性能数据传输
2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928792
Junmin Gu, D. Katramatos, Xin Liu, V. Natarajan, A. Shoshani, A. Sim, Dantong Yu, S. Bradley, S. McKee
{"title":"StorNet: Co-scheduling of end-to-end bandwidth reservation on storage and network systems for high-performance data transfers","authors":"Junmin Gu, D. Katramatos, Xin Liu, V. Natarajan, A. Shoshani, A. Sim, Dantong Yu, S. Bradley, S. McKee","doi":"10.1109/INFCOMW.2011.5928792","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928792","url":null,"abstract":"Modern scientific data-intensive applications brought about the need for novel data transfer technologies and automated tools capable of effectively utilizing available raw network bandwidth and intelligently assisting scientists in replicating large volumes of data to desired locations in a timely manner. In this paper we describe the design of StorNet, an integrated end-to-end resource provisioning and management system for high performance data transfers that can operate with heterogeneous network protocols and storage systems in a federated computing environment. StorNet allocates and co-schedules storage and network resources involved in data transfers. It is based on existing Storage Resource Manager, TeraPaths, and OSCARS capabilities. StorNet provides data intensive applications with the capability of predictable, yet efficient delivery of data at rates of multiple gigabits/second, bridging end-to-end advanced storage and network technologies in a transparent way.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131029532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Human centric data fusion in Vehicular Cyber-Physical Systems 车载信息物理系统中以人为中心的数据融合
2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928899
Aditya Wagh, Xu Li, Jingyan Wan, C. Qiao, Changxu Wu
{"title":"Human centric data fusion in Vehicular Cyber-Physical Systems","authors":"Aditya Wagh, Xu Li, Jingyan Wan, C. Qiao, Changxu Wu","doi":"10.1109/INFCOMW.2011.5928899","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928899","url":null,"abstract":"Building effective Vehicular Cyber-Physical Systems (VCPS) to improve road safety is a non-trivial challenge, especially when we examine how the driver benefits from the existing and proposed technologies in the presence of Human Factors (HF) related negative factors such as information overload, confusion, and distraction. In this paper, we address a human-centric data fusion problem in VCPS. To the best of our knowledge, this work is the first to apply HF to the data fusion problem, which has both theoretical value and practical implications. In particular, we present a new architecture by defining a distinct High-Level (HL) data fusion layer with HF considerations, that is placed between the safety applications on the VCPS and the human driver. A data fusion algorithm is proposed to fuse multiple messages (based on reaction time, message type, preferred evasive actions, severity of the hazards, etc) and to maximize the total utility of the messages. The algorithm is tested with real human drivers to demonstrate the potential benefit of incorporating such human-centric fusion in existing warning systems.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130678687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
SDSM: A secure data service mechanism in mobile cloud computing SDSM:移动云计算中的安全数据服务机制
2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928784
Weiwei Jia, Haojin Zhu, Z. Cao, Lifei Wei, Xiaodong Lin
{"title":"SDSM: A secure data service mechanism in mobile cloud computing","authors":"Weiwei Jia, Haojin Zhu, Z. Cao, Lifei Wei, Xiaodong Lin","doi":"10.1109/INFCOMW.2011.5928784","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928784","url":null,"abstract":"To enhance the security of mobile cloud users, a few proposals have been presented recently. However we argue that most of them are not suitable for mobile cloud where mobile users might join or leave the mobile networks arbitrarily. In this paper, we design a secure mobile user-based data service mechanism (SDSM) to provide confidentiality and fine-grained access control for data stored in the cloud. This mechanism enables the mobile users to enjoy a secure outsourced data services at a minimized security management overhead. The core idea of SDSM is that SDSM outsources not only the data but also the security management to the mobile cloud in a trust way. Our analysis shows that the proposed mechanism has many advantages over the existing traditional methods such as lower overhead and convenient update, which could better cater the requirements in mobile cloud computing scenarios.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132451425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 114
Capacity of multi-hop wireless network with frequency agile software defined radio 频率敏捷软件无线电多跳无线网络容量研究
2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928850
Juncheng Jia, W. Zhuang
{"title":"Capacity of multi-hop wireless network with frequency agile software defined radio","authors":"Juncheng Jia, W. Zhuang","doi":"10.1109/INFCOMW.2011.5928850","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928850","url":null,"abstract":"With the advance of both hardware and software technologies, the concept of software defined radio (SDR) is becoming more and more popular in the academic and industrial communities. Its popularity has been increased by the recent intensive research of cognitive radio technology, which is built on top of SDR. One of key features of SDR is its capability of frequency agility, which means a single SDR can access multiple channels, subject to a certain total frequency bandwidth (channel span) constraint. Compared with the traditional multiple-radio solutions, the SDR setup has the advantages of higher flexibility and reduced hardware size (cost). In this paper, we investigate the achievable capacity of a wireless network with single-SDR equipped transceivers, especially a multiple-hop network, for any given network flows. We propose new approaches to formulate the single-SDR constraint, which is unique for the derivation of capacity upper bounds. We also propose a heuristic algorithm to obtain a lower bound for the capacity. Both numerical and simulation results are presented to demonstrate the potential capacity for an SDR network and compared it with a multipleradio network.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129248034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Repeater design and modeling for molecular communication networks 分子通信网络中继器设计与建模
2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928865
T. Nakano, J. Shuai
{"title":"Repeater design and modeling for molecular communication networks","authors":"T. Nakano, J. Shuai","doi":"10.1109/INFCOMW.2011.5928865","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928865","url":null,"abstract":"Molecular communication or communication based on molecules in aqueous environments often relies on free diffusion of signal molecules where a transmitter nanomachine releases signal molecules that randomly walk in the environments to reach the receiver nanomachine. Since the signal molecules randomly walk in the three dimensional environments, the number of molecules that can reach the receiver significantly decreases over distance. A challenge in molecular communication is therefore to overcome the attenuation of molecular signals over distance. In this paper, we investigate a design of repeater nanomachines that amplify signal molecules to enable molecular communication over extended distances. The repeater nanomachines are placed between a transmitter and the receiver, where signal molecules released by the transmitter are amplified by the intermediate repeaters to reach the receiver. A specific biological model and design of molecular communication are used for designing repeaters, with simulation results showing the conditions for the repeaters to amplify, signal molecules for long distance molecular communication.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126448874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Empirical analysis of the evolution of follower network: A case study on Douban 追随者网络演化的实证分析——以豆瓣为例
2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928945
Junzhou Zhao, John C.S. Lui, D. Towsley, X. Guan, Yadong Zhou
{"title":"Empirical analysis of the evolution of follower network: A case study on Douban","authors":"Junzhou Zhao, John C.S. Lui, D. Towsley, X. Guan, Yadong Zhou","doi":"10.1109/INFCOMW.2011.5928945","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928945","url":null,"abstract":"Follower networks such as Twitter and Digg are becoming popular form of social information networks. This paper seeks to gain insights into how they evolve and the relationship between their structure and their ability to spread information. By studying the Douban follower network, which is a popular online social network in China, we provide some evidences showing its suitability for information spreading. For example, it exhibits an unbalanced bow-tie structure with a large out-component, which indicates that the majority of users can spread information widely; the effective diameter of the strongly connected component is shrinking as the user base grows, which facilitates spreading; and the transitivity property shows that people in a follower network tend to shorten the path of information flow, i.e., it takes fewer hops to spread information. Also, we observe the following users' behaviors, a user's following activity decays exponentially during her lifetime and the following behaviors differ according to the age of the account. These findings provide a deep understanding on the evolution of follower networks, and can provide guidelines on how to build an efficient information diffusion system.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122544867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Keeping the connectivity and saving the energy in the internet 保持网络连接,节约网络能源
2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928831
F. Cuomo, Anna Abbagnale, A. Cianfrani, Marco Polverini
{"title":"Keeping the connectivity and saving the energy in the internet","authors":"F. Cuomo, Anna Abbagnale, A. Cianfrani, Marco Polverini","doi":"10.1109/INFCOMW.2011.5928831","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928831","url":null,"abstract":"Nowadays a big effort is spent to reduce the Internet energy consumption. Actual Internet topologies have space to power off some links and devices to reduce the energy consumed in off-peak periods still guaranteeing connectivity among terminals. In this work we leverage the algebraic connectivity of the graph modeling an ISP network in order to define the ESACON (Energy Saving based on Algebraic CONnectivity) algorithm. We then consider the network connectivity as a first target performance to be assured. To this aim we identify a metric based on the algebraic connectivity that, on one side, allows to switch off several links with the consequent significant energy saving and, on the other side, still preserves network connectivity and network performance for efficiently supporting the Internet traffic. We find that ESACON achieves better performance with respect to similar topology-aware approaches; moreover ESACON performance are comparable with ones of a complex traffic-aware solution.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"301 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123119939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Efficient prioritized congestion management for social network based live sharing 基于社交网络直播共享的高效优先级拥塞管理
2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928817
Yili Gong, Wenjie Wang, C. Liu
{"title":"Efficient prioritized congestion management for social network based live sharing","authors":"Yili Gong, Wenjie Wang, C. Liu","doi":"10.1109/INFCOMW.2011.5928817","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928817","url":null,"abstract":"In this paper, we explicitly consider the scenario of supporting applications with high-bandwidth and low-latency requirements in mobile social networks (MSNs), by leveraging the existing social network sites. Our solution does not assume any centralized server who coordinates the data storage, access, and group management. We address the fundamental challenge supporting such applications, namely: the limited bandwidth availability and intense bandwidth requirement that may hinder the deployment of these applications. We propose a link-based congestion management (LCM) mechanism to adjust the source rate of each stream, and a prioritized flow management mechanism composed of a novel concept of “stress weight” and its associated utility function. Extensive simulation results show that our proposal achieves 50% less rate reduction under the severe congestions, and the achievable source rate of the proposed LCM scheme is over one order of magnitude higher than the alternative approach.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125162468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信