International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2014)最新文献

筛选
英文 中文
QoE prediction model for multimedia services in IP network applying queuing policy 基于排队策略的IP网络多媒体业务QoE预测模型
L. Sevcik, M. Voznák, J. Frnda
{"title":"QoE prediction model for multimedia services in IP network applying queuing policy","authors":"L. Sevcik, M. Voznák, J. Frnda","doi":"10.1109/SPECTS.2014.6879998","DOIUrl":"https://doi.org/10.1109/SPECTS.2014.6879998","url":null,"abstract":"This paper proposes a QoE (Quality of Experience) assessment model which can estimate voice and video quality. Based on the proposed model, speech or video quality is calculated with regard to policies applied for packet processing by routers and to the level of total network utilization. The contribution of this paper lies in designing a new computational model capable of predicting the quality of multimedia services respecting queuing policy and transmission speed of interfaces on routers in IP networks.","PeriodicalId":429912,"journal":{"name":"International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2014)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116155460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Hybrid simulated-emulated platform for heterogeneous access networks performance investigations 异构接入网性能调查的混合仿真平台
I. Bisio, Alessandro Delfino, S. Delucchi, F. Lavagetto, M. Marchese, G. Portomauro, S. Zappatore
{"title":"Hybrid simulated-emulated platform for heterogeneous access networks performance investigations","authors":"I. Bisio, Alessandro Delfino, S. Delucchi, F. Lavagetto, M. Marchese, G. Portomauro, S. Zappatore","doi":"10.4304/jnw.10.4.265-272","DOIUrl":"https://doi.org/10.4304/jnw.10.4.265-272","url":null,"abstract":"The availability of different access technologies enables the creation of heterogeneous networks supporting users mobility and assuring several different services. Meanwhile these networks require complex control techniques to assure Quality of Service (QoS) to users. Before implementing such networks, a deep performance analysis, through the use of network simulators or real models, is necessary. In particular the first ones (e.g. Network Simulator 3 - ns-3 among the others) are quite simple and easy to manage and configure, while the second ones assure the handling of real traffic flows. The main contribution of this paper is the description of an hybrid simulated and emulated network evaluation platform, developed by the authors. The platform purpose is to execute a performance analysis of different wireless networks such as Long Term Evolution (LTE) and Wi-Fi, connected to a core network implementing the Differentiated Service (DiffServ) protocol. The paper contains also the results of preliminary validation tests.","PeriodicalId":429912,"journal":{"name":"International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2014)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126187659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Application of discrete-event simulation in acute care's capacity analysis 离散事件模拟在急症护理能力分析中的应用
Hongbiao Yang, Rupy Sawhney, Wolday Abrha
{"title":"Application of discrete-event simulation in acute care's capacity analysis","authors":"Hongbiao Yang, Rupy Sawhney, Wolday Abrha","doi":"10.1109/SPECTS.2014.6879989","DOIUrl":"https://doi.org/10.1109/SPECTS.2014.6879989","url":null,"abstract":"Deploying nurses based on fixed shift could mitigate scarce availability during peak now of patients, but idle time should be resolved. This paper presents the analysis of nurses scheduling for minimal cost and reduced patient waiting time. An acute care unit of a local hospital is thecase study. The main sources to collect the data are historical data of patients' medical records as well as staff activity reports of their daily duty. Arena simulation software is applied to identify an optimum nurse scheduling. A base case model is built and several scenarios with different schedules and resources are compared: the results of these scenarios such as total pay cost and the resource utilization implied an optimal solution. A three shift system that comprises of all registered nurses, reducing the number of chest pain outpatients' rooms. and increasing the common rooms results optimal.","PeriodicalId":429912,"journal":{"name":"International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2014)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127416388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of short-term radio signal disturbances in industrial wireless sensor networks 工业无线传感器网络中短时无线电信号干扰的检测
M. Eskola, T. Heikkilä
{"title":"Detection of short-term radio signal disturbances in industrial wireless sensor networks","authors":"M. Eskola, T. Heikkilä","doi":"10.4304/jnw.10.4.201-208","DOIUrl":"https://doi.org/10.4304/jnw.10.4.201-208","url":null,"abstract":"The performance of wireless sensor networks (WSNs) in industrial applications may be degraded due to harsh radio signal propagation conditions. Mobile heavy machines and large metal and concrete surfaces usually worsen the signal fading effects resulting in deep fades. We have studied the effects of certain industrial environmental disturbances on the quality of the transmitted signals in real-life industrial environments. We used software defined radio (SDR) as the receiver to capture the transmitted signals and analyzed the statistical properties of the captured signals with Matlab/Simulink tools. Our studies led us to a method which aims to identify the transmission problems related to signal multipath propagation by calculating the probability density function (PDF) of the received signal and comparing it to the simulated theoretical Rician distributions. The results show that tracking the transformations of the PDF of the received signal helps to recognize the temporal changes in radio link environment and in that way can help to choose the right actions in order to overcome the communication problems.","PeriodicalId":429912,"journal":{"name":"International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2014)","volume":"54 24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130692010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance evaluation of a multi-frame persistent neighbor discovery strategy based on Sift-distribution in DTN RFID networks DTN RFID网络中基于sift分布的多帧持久邻居发现策略的性能评估
Danilo Amendola, N. Cordeschi, M. Shojafar, V. Abate, F. Rango
{"title":"Performance evaluation of a multi-frame persistent neighbor discovery strategy based on Sift-distribution in DTN RFID networks","authors":"Danilo Amendola, N. Cordeschi, M. Shojafar, V. Abate, F. Rango","doi":"10.1109/SPECTS.2014.6880006","DOIUrl":"https://doi.org/10.1109/SPECTS.2014.6880006","url":null,"abstract":"A multi-frame Neighbor Discovery Protocol over a DTN network with RFID Devices is proposed. This protocol is based on a Sift-distribution (s-Persistent) in order to differentiate the access probability to slots among RFID devices. Moreover, our approach has been considered in a mono-frame and multi-frame scenario. Our s-Persistent approach is applied in a simulated test and in a real test-bed in order to see the effectiveness of the proposal in comparison with a well-known technique such as p-Persistent protocol. Performance Evaluation has been evaluated in terms of number discovered neighbors under different numbers of nodes and frames. Obtained results shows that s-Persistent performs better than p-Persistent increasing the number of discovered neighbors.","PeriodicalId":429912,"journal":{"name":"International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2014)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131082535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Low latency packet processing in software routers 软件路由器中的低延迟数据包处理
T. Meyer, Daniel Raumer, F. Wohlfart, B. Wolfinger, G. Carle
{"title":"Low latency packet processing in software routers","authors":"T. Meyer, Daniel Raumer, F. Wohlfart, B. Wolfinger, G. Carle","doi":"10.1109/SPECTS.2014.6879993","DOIUrl":"https://doi.org/10.1109/SPECTS.2014.6879993","url":null,"abstract":"Commodity hardware can be used to build a software router that is capable of high-speed packet processing while being programmable and extensible. Therefore, software routers provide a cost-efficient alternative to expensive, special hardware routers. The efficiency of packet processing in resource-constrained nodes (e.g. software routers) can be strongly increased through parallel processing with commodity hardware based on multi-core processors. However, intra-node resource contention can have a strong negative impact on the corresponding network node. We describe how multi-core software routers can be optimized for low latency support by utilizing the technologies available in commodity PC hardware. For the analysis we used our approach for modeling of resource contention in resource-constrained nodes which is also implemented as the resource-management extension module for ns-3. Based on that, we derived a specific software router model which we used to optimize the performance. Our measurements show that the configuration of a software router has significant influence on the performance. The results can be used for parameter tuning in such systems.","PeriodicalId":429912,"journal":{"name":"International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2014)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115805814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance evaluation of secure AODV with trust management under an energy aware perspective 能源感知视角下具有信任管理的安全AODV性能评估
Andrea Lupia, F. Rango
{"title":"Performance evaluation of secure AODV with trust management under an energy aware perspective","authors":"Andrea Lupia, F. Rango","doi":"10.1109/SPECTS.2014.6879999","DOIUrl":"https://doi.org/10.1109/SPECTS.2014.6879999","url":null,"abstract":"Ad-hoc networks allow nodes communication without an infrastructure, so they can be used in many environments. This lack of infrastructure introduces many security threats to the nodes in the network. Communication between nodes must be reliable, and protocols for MANETs need to make it possible. Due to the wireless channel and to the possible malicious behavior of nodes, it is necessary to introduce security mechanisms to avoid possible attacks in the network. The introduction of a trust management system on a well-known protocol such as SAODV protocol can protect against more attacks from malicious nodes, making wireless communication reliable and more secure. In this contribution Black hole and gray hole attacks will be detected, so communication will not be disrupted. Moreover, in order to understand as the energy consumption due to additional introduced security mechanisms, an energetic analysis is also performed on SAODV with and without trust management.","PeriodicalId":429912,"journal":{"name":"International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2014)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129395492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
On a mechanism of detection of coalitions for reputation systems in P2P networks P2P网络中声誉系统联盟检测机制研究
Grzegorz Orynczak, Z. Kotulski
{"title":"On a mechanism of detection of coalitions for reputation systems in P2P networks","authors":"Grzegorz Orynczak, Z. Kotulski","doi":"10.1109/SPECTS.2014.6879996","DOIUrl":"https://doi.org/10.1109/SPECTS.2014.6879996","url":null,"abstract":"One of the most common types of attacks on reputation systems is made by reporting unfair ratings. They can be performed by the individual malicious members or by a group of agents forming a coalition and cooperating together in order to achieve particular purpose (e.g, to gain higher position in the community or to discredit the competition). Due to the fact, that such attacks are performed often by intelligent coalitions, they are much more harmful and harder to detect. This paper describes a novel algorithm for coalition detecting in reputation systems. By observing the agents which are controversially rated by the community it is possible to construct agents cooperation matrices and identify harmful coalitions. Detailed description of the algorithm is provided and presented simulation results confirm the effectiveness of the detection.","PeriodicalId":429912,"journal":{"name":"International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2014)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115225112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Simulating billion-task parallel programs 模拟十亿任务并行程序
K. Perumalla, Alfred Park
{"title":"Simulating billion-task parallel programs","authors":"K. Perumalla, Alfred Park","doi":"10.1109/SPECTS.2014.6879997","DOIUrl":"https://doi.org/10.1109/SPECTS.2014.6879997","url":null,"abstract":"In simulating large parallel systems, bottom-up approaches exercise detailed hardware models with effects from simplified software models or traces, whereas top-down approaches evaluate the timing and functionality of detailed software models over coarse hardware models. Here, we focus on the top-down approach and significantly advance the scale of the simulated parallel programs. Via the direct execution technique combined with parallel discrete event simulation, we stretch the limits of the top-down approach by simulating parallel programs with hundreds of millions of tasks. Although the scaling issues and solutions presented here are generally applicable, we focus on message passing interface (MPI) programs. Using a timing-validated benchmark application, a proof-of-concept scaling level is achieved to over 0.22 billion virtual MPI processes on 216,000 cores of a Cray XTS supercomputer, representing one of the largest direct execution simulations to date, combined with a multiplexing ratio of 1024 simulated tasks per real task.","PeriodicalId":429912,"journal":{"name":"International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121159395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A partially centralized messaging control scheme using star topology in delay and disruption tolerant networks 在容忍延迟和中断网络中使用星型拓扑的部分集中式消息传递控制方案
Shoki Oiyama, Hiroki Nishiyama, N. Kato
{"title":"A partially centralized messaging control scheme using star topology in delay and disruption tolerant networks","authors":"Shoki Oiyama, Hiroki Nishiyama, N. Kato","doi":"10.1109/SPECTS.2014.6879995","DOIUrl":"https://doi.org/10.1109/SPECTS.2014.6879995","url":null,"abstract":"Terminal-to-terminal communication technology has been studied to make communication and information distribution possible in an area, where communication infrastructure has been damaged or is not present, such as disaster area or rural area. Since mobile communication devices have short transmission range and high mobility owing to it bringing held by human beings, the network consisting of those nodes suffers from challenging conditions such as intermittent connectivity and absence of the end-to-end path between source and destination. To conquer that, Delay and Disruption Tolerant Networks (DTNs) using store-and-forward approach has attracted much research attention. In general routing algorithms, DTNs nodes exchange the control messages, e.g. the summary vector messages and request messages to know which messages each node possesses and to request replicated messages. However, the number of control messages being exchanged increases with the increase of node density. Furthermore, the size of a control message is proportional according to the number of replicas that shows. To reduce the number of control messages, we propose a partially centralized control scheme using star topology networks. Through our simulations, we show that our proposed method dramatically reduces control overhead in high node density scenarios.","PeriodicalId":429912,"journal":{"name":"International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123948262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信