2014 IEEE Computers, Communications and IT Applications Conference最新文献

筛选
英文 中文
Analyzing the cumulative interfering noise in multi-hop IEEE 802.11 networks 多跳IEEE 802.11网络中累积干扰噪声分析
2014 IEEE Computers, Communications and IT Applications Conference Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017184
Chenfei Zhang, L. Lei, Ting Zhang
{"title":"Analyzing the cumulative interfering noise in multi-hop IEEE 802.11 networks","authors":"Chenfei Zhang, L. Lei, Ting Zhang","doi":"10.1109/ComComAp.2014.7017184","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017184","url":null,"abstract":"Performance evaluation of IEEE 802.11 multi-hop wireless networks has been drawing significant attention in recent years whereas most studies ignore the interfering noise far away. However, since the packets may overlap in time in multi-hop wireless networks, the cumulative energy of the noise coming from far away can be high enough to affect the performance of the network. In this paper, we investigate the interfering noise in the IEEE 802.11 wireless multi-hop networks. Then, we perform simulations to evaluate the effect of cumulative interfering noise on the performance of IEEE 802.11 DCF protocol. The results show that the transmission probability, collision probability and the saturation throughput of each flow in IEEE 802.11 multi-hop wireless networks have been greatly affected by the cumulative interfering noise.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"433 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132592785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From tie strength to function: Home location estimation in social network 从纽带强度到功能:社交网络中的家庭位置估计
2014 IEEE Computers, Communications and IT Applications Conference Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017172
Jinpeng Chen, Yu Liu, Ming Zou
{"title":"From tie strength to function: Home location estimation in social network","authors":"Jinpeng Chen, Yu Liu, Ming Zou","doi":"10.1109/ComComAp.2014.7017172","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017172","url":null,"abstract":"In this paper, we focus on the problem of estimating users' home locations in the Twitter network. In order to solve the aforementioned problem, we propose a Social Tie Factor Graph Model (STFGM) for estimating a Twitter user's city-level location based on the following network, user-centric data and tie strength. In STFG, relationships between users and locations in social network are modeled as nodes, the attributes and correlations are modeled as factors. An efficient algorithm is proposed to learn model parameters and to predict unknown relationships. We evaluate our proposed method on large Twitter networks. Experimental results demonstrate that our proposed method significantly outperforms several state-of-the-art methods and achieves the best performance.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132024231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Adaptive Learning Objects Assembly with compound constraints 具有复合约束的自适应学习对象组装
2014 IEEE Computers, Communications and IT Applications Conference Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017166
Shanshan Wan, Zhendong Niu
{"title":"Adaptive Learning Objects Assembly with compound constraints","authors":"Shanshan Wan, Zhendong Niu","doi":"10.1109/ComComAp.2014.7017166","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017166","url":null,"abstract":"This article addresses how to fulfill ALOA (Adaptive Learning Objects Assembly) which provides users personalized learning resources and learning path based on evolutionary PBIL (Population Based Incremental Learning) algorithm. Both the users' preferences and learning resources' intrinsic characteristics are considered here. And the experience from proficient experts is used to give the LO (Learning Object) difficulty level and important grade which guides the LO's sequencing and selection. The constraints of knowledge such as basic ones, itinerary ones and compulsory ones are also vital factors for ALOA. All of above are modeled as a Constraint Satisfaction Problem (CSP). The PBIL algorithm is proposed and applied to ALOA firstly. The hybrid intelligent evolutionary algorithm is tested on true teaching data and the participants also give the learning feeling. We also obtained the experiment data from the tested data and questionnaire. ALOA's good validity, accuracy, and stability performance are verified.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125660541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An overlapping community detection algorithm for opportunistic networks 机会网络的重叠社团检测算法
2014 IEEE Computers, Communications and IT Applications Conference Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017180
Xuebin Ma, Zhenchao Ouyang, Lin Bai, Xin Zhan, Xiangyu Bai
{"title":"An overlapping community detection algorithm for opportunistic networks","authors":"Xuebin Ma, Zhenchao Ouyang, Lin Bai, Xin Zhan, Xiangyu Bai","doi":"10.1109/ComComAp.2014.7017180","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017180","url":null,"abstract":"A more detailed community structure can contribute to a better understanding of the network, which can also benefit efficient routing protocols and QoS schemes designing. For an Opportunistic Network which consists of different kinds of mobile nodes, its topology changes over time. Therefore the community detection becomes more difficult than static situations. Moreover the overlapping community detection is a more complex problem. This paper analyzes the time varying topology of Opportunistic Networks and the overlapping community structures of human. Then, we propose a new detection algorithm to solve the overlapping community detection problems in Opportunistic Networks. Only with the local network topology information and a short period, nodes can get their overlapping community structures by our detection algorithm. Numerical simulations with both scenarios of movement models and real trace data are presented to illustrate the accuracy and efficiency of our algorithm.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126208075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A cost sensitive approach for Virtual Network reconfiguration 一种成本敏感的虚拟网络重构方法
2014 IEEE Computers, Communications and IT Applications Conference Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017194
Li Xu, Guozhen Tan, Xia Zhang
{"title":"A cost sensitive approach for Virtual Network reconfiguration","authors":"Li Xu, Guozhen Tan, Xia Zhang","doi":"10.1109/ComComAp.2014.7017194","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017194","url":null,"abstract":"Network Virtualization paves the way for sharing the physical infrastructure with many service providers and enables resources in physical substrate network being applied and provisioned as a form of Virtual Network(VN). However, there exist many obstacles in applications of this technology. The problem of VN embedding is commonly considered the most difficult one of them. Most existing research only considers the case of how to embed VN request. Provided user demands on Virtual Network are dynamically changing, how to efficiently reconfigure VN to adapt to changing demand is challenging also. In this paper, our objective is to find way for optimally reorganize VN that already embedded on VN in a cost sensitive way to meet the changed demand. We address this problem by proposing a cost sensitive VN reconfiguration approach. A heuristic VN reconfiguration algorithm with virtual node and virtual link migration and swapping strategy is designed. We validate and evaluate the given algorithms by conducting experiments in high fidelity emulation environment. Our evaluation results show that the proposed approach can effectively reconfigure VN while minimizing cost and fragmentation of resource. By comparing our algorithms with others, the given reconfiguration algorithm outperforms existing solutions.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115147572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信