2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)最新文献

筛选
英文 中文
Implementing a Cloud-Based Service Supporting Biological Network Simulations 实现支持生物网络模拟的基于云的服务
Fabrizio Bertone, G. Caragnano, L. Mossucca, O. Terzo, A. Benso, G. Politano, A. Savino
{"title":"Implementing a Cloud-Based Service Supporting Biological Network Simulations","authors":"Fabrizio Bertone, G. Caragnano, L. Mossucca, O. Terzo, A. Benso, G. Politano, A. Savino","doi":"10.1109/AINA.2016.102","DOIUrl":"https://doi.org/10.1109/AINA.2016.102","url":null,"abstract":"Biological analysis applications are usually high demanding in terms of computational power required. Cloud Computing infrastructures can be of great value supporting those type of applications, thanks to the high flexibility and performing hardware provided. The merging of solutions based on MapReduce and distributed file systems services, allows the creation of scalable infrastructures and data management services adaptable to various use cases and requirements. However, the implementation and deployment of cloud based services remains a complex task for biological researchers without specific skills. In this paper authors describe a service that allows the execution of a biological networks simulation tool in cloud, implemented with the aid of MapReduce algorithms called MaReX. The paper shows in detail the interactions occurring between the various components of the platform such as: database, process manager agent and graphical user interface.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131564061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spectrum Sensing in Cognitive Radio Networks and Capacity Analysis for Vehicular Network 认知无线电网络中的频谱感知与车载网络容量分析
Wencheng Chen, X. Wen, Wei Li
{"title":"Spectrum Sensing in Cognitive Radio Networks and Capacity Analysis for Vehicular Network","authors":"Wencheng Chen, X. Wen, Wei Li","doi":"10.1109/AINA.2016.69","DOIUrl":"https://doi.org/10.1109/AINA.2016.69","url":null,"abstract":"In recent years, to meet the increasing demands for vehicular communications, cognitive radio(CR) technology have been used to make the communication more effectively. In this paper, we propose a spectrum sensing channel model based on cooperative interference and interleaved channel which consists of two stages transceiver in vehicular network. This model makes use of CR technology with switching matrix to build a compressed channel between primary user(PU) and secondary user(SU). Additionally, we investigate and analyze factors consist of compression ratio, detection probability, false alarm rate, PU occupancy probability and power control parameters which effect channel capacity significantly by simulation and the experimental results show good performances to validate our method.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131852662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SDN Based Architecture to Improve Video Streaming in Home Networks 基于SDN架构改善家庭网络视频流
R. M. Abuteir, A. Fladenmuller, Olivier Fourmaux
{"title":"SDN Based Architecture to Improve Video Streaming in Home Networks","authors":"R. M. Abuteir, A. Fladenmuller, Olivier Fourmaux","doi":"10.1109/AINA.2016.58","DOIUrl":"https://doi.org/10.1109/AINA.2016.58","url":null,"abstract":"Nowadays, Internet video is the dominant internet traffic. DASH is an adaptive video streaming technique introduced to enable high quality video delivery over HTTP. In home networks, multiple video streams will compete for bandwidth, thus leading to poor performance and impacting the received quality of experience. In this paper we introduce a new technique to address this issue at the home network gateway without modifying neither the client player nor the video server. We design our framework NAVS (Network Assisted Video Streaming) relies on the deployment of Software Defined Networking (SDN). NAVS performs a dynamic traffic shaping based on the collected network traffic statistics and monitoring of video flows. NAVS dynamically allocates bandwidth for each video flow in real time. NAVS scheme has been evaluated over several metrics: bandwidth utilization, instability of players as well as the average video quality received by the clients. Our results demonstrate an improvement for all these parameters.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131913919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Realization of Time Synchronization Protocol Based on Frequency Skew Bid and Dynamic Topology Using Embedded Linux System 基于频率偏差和动态拓扑的时间同步协议在嵌入式Linux系统上的实现
Zhenqiang Huang, Enqing Dong, Yuan Yuan, W. Liu
{"title":"Realization of Time Synchronization Protocol Based on Frequency Skew Bid and Dynamic Topology Using Embedded Linux System","authors":"Zhenqiang Huang, Enqing Dong, Yuan Yuan, W. Liu","doi":"10.1109/AINA.2016.29","DOIUrl":"https://doi.org/10.1109/AINA.2016.29","url":null,"abstract":"The time synchronization of network will encounter a severe challenge due to the proliferation of scale in wireless sensor networks. In order to improve the precision of time synchronization in network, a time synchronization protocol based on frequency skew bid and dynamic topology (FBDT) is designed in the paper as well as realized on Embedded Linux System. To be able to effectively inhibit synchronization error accumulation in multi-hop, a clustering mechanism in network region is adopted to reduce synchronization hops. In the protocol, every node selects the parent node which has a more stable clock frequency and fewer synchronization hops to restrain accumulation of synchronization error, meanwhile, combining fast and slow synchronization strategy is utilized to meet requirement on two performance indicators of synchronization accuracy and convergence time. Availing itself of hops information to select the parent node dynamically, the protocol can fit well in the network of dynamic topology, with good resistance to destructive and scalability. A method similar with TPSN protocol is used to eliminate transmission delay during synchronization between two nodes. Testing results on embedded Linux development board indicate that the FBDT synchronization protocol can reach the precision of μs, which can satisfy the requirements for practical applications.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122076047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
QoE-Fuzzy VHO Approach for Heterogeneous Wireless Networks (HWNs) 异构无线网络qos -模糊VHO算法
A. B. Zineb, M. Ayadi, S. Tabbane
{"title":"QoE-Fuzzy VHO Approach for Heterogeneous Wireless Networks (HWNs)","authors":"A. B. Zineb, M. Ayadi, S. Tabbane","doi":"10.1109/AINA.2016.35","DOIUrl":"https://doi.org/10.1109/AINA.2016.35","url":null,"abstract":"Different wireless technologies are assumed tocooperate in a single heterogeneous environment in futurenetwork deployment schemes. Such environment is characterizedby a multitude of new services based on multimedia services likegaming and real time video streaming. When dealing with video services, traditional QoS solutionsare not sufficient for ensuring video awareness and good user'sperception. Quality of Experience (QoE) management approachhave been introduced to estimate the quality level of multimediaservices. In an heterogeneous environment every user can switchbetween many networks during his communication in a verticalhandover (VHO) process and QoS may decrease as well as thevideo quality. That is why, maintaining the requested QoS andkeeping a satisfying QoE during a VHO process is the main goalfor HWNs. In this paper, we proposes a QoE-fuzzy vertical handoveralgorithm with QoS management and QoE decision. Simulationresults of the proposed system show performances improvementfor throughput and delays.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128576105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
LinkedPolitics: Incremental Semantic Lifting of Political Facts LinkedPolitics:政治事实的增量语义提升
J. Tscherrig, E. Mugellini, Omar Abou Khaled, P. Cudré-Mauroux
{"title":"LinkedPolitics: Incremental Semantic Lifting of Political Facts","authors":"J. Tscherrig, E. Mugellini, Omar Abou Khaled, P. Cudré-Mauroux","doi":"10.1109/AINA.2016.93","DOIUrl":"https://doi.org/10.1109/AINA.2016.93","url":null,"abstract":"Exploiting facts that are published online using semi-structured or unstructured formats is a highly complex task, pieces of data are typically published in isolation and periodically updated in a bulk fashion without any coordination. In this paper, we propose a new software pipeline tackling this issue and semantically lifting online facts as Linked Data in a continuous manner. Our solution, LinkedPolitics, extracts, converts, interlinks, and finally makes available as Linked Data online facts that could not be transparently exposed and exploited otherwise. Our system is online, in the sense that it automatically makes available new facts as they are uploaded online. We also present a deployment of LinkedPolitics centered around the Swiss Parliament. Our deployment extracts and semantically lifts a flurry of political facts that are periodically published in unstructured form by the Library Service of the Swiss Federal Assembly. It then automatically materializes a number of views to support different visualizations of the data in order to capture the actions, announcements or votes made by the politicians, as well as their relationships to each other and to external entities such as companies.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128879622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Packet Filtering and Deep Packet Inspection Hybrid Mechanism for IDS Early Packet Matching 基于网络包过滤和深度包检测的IDS早期包匹配混合机制
Z. Trabelsi, S. Zeidan, M. Masud
{"title":"Network Packet Filtering and Deep Packet Inspection Hybrid Mechanism for IDS Early Packet Matching","authors":"Z. Trabelsi, S. Zeidan, M. Masud","doi":"10.1109/AINA.2016.178","DOIUrl":"https://doi.org/10.1109/AINA.2016.178","url":null,"abstract":"Modern network packet processing applications such as Intrusion Detection System (IDS) perform packet filtering and deep packet inspection (DPI), also known as packet content inspection. Fundamentally, for packet filtering, these applications attempt to use the contents of some header fields of the network, transport and application layers of the packets. While for DPI, these applications use attack signature rules to search for predefined patterns in the packet application header fields or payload data. This paper discusses a hybrid mechanism based on the use of splay tree filters and pattern-matching algorithms to enhance IDS packet filtering and DPI performance, respectively. The proposed mechanism uses network traffic statistics to dynamically optimize the order of the splay tree filters, allowing early acceptance and rejection of network packets. In addition, DPI signature rules are reordered according to their matching frequencies, allowing early packets acceptance. We demonstrate the merit of our mechanism through simulations performed on Snort's string set.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126337297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An Energy-Aware Migration of Virtual Machines 虚拟机的能源感知迁移
Dilawaer Duolikun, Ryoma Watanabe, Hiroki Kataoka, Shigenari Nakamura, T. Enokido, M. Takizawa
{"title":"An Energy-Aware Migration of Virtual Machines","authors":"Dilawaer Duolikun, Ryoma Watanabe, Hiroki Kataoka, Shigenari Nakamura, T. Enokido, M. Takizawa","doi":"10.1109/AINA.2016.156","DOIUrl":"https://doi.org/10.1109/AINA.2016.156","url":null,"abstract":"We have to reduce the electric energy consumed by servers in a cluster. In our previous studies, types of algorithms to select an energy-efficient server for a request process are proposed. Furthermore, schemes for energy-efficiently migrating a process and replicas of a process are discussed where a process and a replica migrate on a host server to a more energy-efficient guest server in our previous studies. However, it is not easy to realize the migration of processes on types of servers. Virtual machine (VM) technologies are now widely used to support applications with virtual resource service in could computing systems. Here, a virtual machine with application processes can migrate from a host server to another guest server. In this paper, we newly propose an energy-aware migration scheme of virtual machines (EAMV). Here, processes on a virtual machine can migrate to a server which consumes smaller electric energy and can be energy-efficiently performed in a cluster. We implement the EAMV scheme and evaluate the migration scheme in terms of energy consumption of servers and execution time of each process.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133718272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Trustworthy P2P Data Delivery for Moving Objects in Wireless Ad-Hoc Networks 无线自组织网络中移动对象的可信P2P数据传输
A. Waluyo, D. Taniar, B. Srinivasan, W. Rahayu
{"title":"Trustworthy P2P Data Delivery for Moving Objects in Wireless Ad-Hoc Networks","authors":"A. Waluyo, D. Taniar, B. Srinivasan, W. Rahayu","doi":"10.1109/AINA.2016.79","DOIUrl":"https://doi.org/10.1109/AINA.2016.79","url":null,"abstract":"In a mobile Peer-to-Peer (P2P) environment, where inherent resource constraints (e.g. battery, bandwidth and computing power) exist, the notion of reliability and efficiency especially around communication of messages between peers is a crucial factor. In this paper, we introduce a trustworthy token-passing multi-point relays (TOP) data dissemination scheme for moving objects in wireless ad-hoc networks. The proposed scheme encompasses the trustworthy model and location-based scheduling technique capable of determining the most optimal schedule for the target peers to receive messages based on the location and mobility parameter. The performance of the proposed approach is compared against the existing state of techniques namely pure flooding and Trustworthiness-based Broadcast (TBB) scheme. The experimental evaluation includes a number of metrics, such as transmission cost, computational cost and message deliverability, of which the results showed promising performance of the proposed scheme.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129054241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Data Usage Control System Using Dynamic Taint Tracking 一种采用动态污点跟踪的数据使用控制系统
J. Schütte, G. Brost
{"title":"A Data Usage Control System Using Dynamic Taint Tracking","authors":"J. Schütte, G. Brost","doi":"10.1109/AINA.2016.127","DOIUrl":"https://doi.org/10.1109/AINA.2016.127","url":null,"abstract":"Data analytics services are on the rise, fostered by an increasing number of wearables and industrial sensors which are connected over the Internet. As a result, users who want to take advantage of these services are confronted with the challenge of keeping their private data and business secrets secure, while still providing the information required for the analytics service to operate. Traditional access and usage control do not solve this problem, as they only take binary access decisions, but do not enforce specific views on data sets. We propose a mechanism to control the ways in which data may be processed, thereby limiting the information which can be gained from data sets to the specific needs of a service. The core of our approach is to model data analytics as a data flow problem and to apply dynamic taint analysis for monitoring the processing of individual records. We propose a policy language to state requirements on the way how data is processed and enforce measures to ensure that critical data is not revealed. Our approach is based on the query evaluation of a complex event processing engine, which is thereby turned into a policy-controlled privacy-preserving data analytics service.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121361895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信