2012 Third International Conference on Networking and Computing最新文献

筛选
英文 中文
Performance Evaluation of AODV and AOMDV with Probabilistic Relay in VANET Environments VANET环境下带概率中继的AODV和AOMDV性能评价
2012 Third International Conference on Networking and Computing Pub Date : 2012-12-05 DOI: 10.1109/ICNC.2012.47
R. Anggoro, T. Kitasuka, Ryoji Nakamura, M. Aritsugi
{"title":"Performance Evaluation of AODV and AOMDV with Probabilistic Relay in VANET Environments","authors":"R. Anggoro, T. Kitasuka, Ryoji Nakamura, M. Aritsugi","doi":"10.1109/ICNC.2012.47","DOIUrl":"https://doi.org/10.1109/ICNC.2012.47","url":null,"abstract":"Vehicular ad hoc networks (VANETs) are the specific class of Mobile ad hoc networks (MANETs). Since vehicles tend to move in a high speed, the network topology is rapidly changed. Thus vehicle's connectivity problem is one of the interesting issues in VANETs. Ad hoc on-demand multipath distance vector (AOMDV) is the extended version of ad hoc on-demand distance vector (AODV). AOMDV is designed to overcome a connectivity problem due to highly dynamic network topology. It provides multipath for data packets delivery from the source to the destination. Although AOMDV outperforms AODV in packet delivery ratio, AOMDV's multipath establishment and maintenance generate more control packets than AODV's unipath. However increasing the vehicle speed will degrade their performance. Thus in this paper, we added probabilistic relay, which enables adjacent vehicles to probabilistically relay unsuccessful data packet transmission, into IEEE 802.11 as a MAC standard model and combined AODV with probabilistic relay (AODV-PR) and AOMDV with probabilistic relay (AOMDV-PR). Based on our simulation result, the addition of probabilistic relay clearly helps those protocols to improve their performances especially in packet delivery ratio even under a high speed. Moreover, probabilistic relay adds beacons, but no additional routing overhead. Probabilistic relay, clearly solved connectivity problem in highly dynamic topology of VANETs. We evaluate those protocol performances based on packet delivery ratio, routing overhead, and average delivery delay under variation of vehicle speed.","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128059149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A Fast Network-on-Chip Simulator with QEMU and SystemC 基于QEMU和SystemC的快速片上网络模拟器
2012 Third International Conference on Networking and Computing Pub Date : 2012-12-05 DOI: 10.1109/ICNC.2012.55
K. Nakajima, Takuji Hieda, Ittetsu Taniguchi, H. Tomiyama, H. Takada
{"title":"A Fast Network-on-Chip Simulator with QEMU and SystemC","authors":"K. Nakajima, Takuji Hieda, Ittetsu Taniguchi, H. Tomiyama, H. Takada","doi":"10.1109/ICNC.2012.55","DOIUrl":"https://doi.org/10.1109/ICNC.2012.55","url":null,"abstract":"Network-on-Chip (NoC) is considered as a promising interconnection scheme for many-core System-on-a-Chip (SoC) since it offers better scalability than traditional bus-based interconnection. In this work, we have developed a fast simulator of NoC architectures using QEMU and SystemC. QEMU is an open-source CPU emulator which is widely used in many simulation platforms such as Android Emulator. In the proposed simulator, each CPU core is emulated by a QEMU, and the network part including NoC routers is modeled with SystemC. The SystemC simulator and QEMUs are connected by TCP sockets on a host computer. Our simulator is fast because QEMUs run in parallel on a multi-core host computer or even multiple host computers. Also, our simulator is highly retarget able because QEMU provides a variety of CPU models and we use QEMU as is. In our experiments, our simulator successfully simulates a 108-core NoC in a practical time. We have also confirmed the scalability and retarget ability of our NoC simulator.","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133701605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Automated Route Planning for Milk-run Transport Logistics Using Model Checking 基于模型检验的牛奶运输物流自动化路线规划
2012 Third International Conference on Networking and Computing Pub Date : 2012-12-05 DOI: 10.1109/ICNC.2012.44
Takashi Kitamura, Keishi Okamoto
{"title":"Automated Route Planning for Milk-run Transport Logistics Using Model Checking","authors":"Takashi Kitamura, Keishi Okamoto","doi":"10.1109/ICNC.2012.44","DOIUrl":"https://doi.org/10.1109/ICNC.2012.44","url":null,"abstract":"We develop a specification framework for milk run transport logistics, applying model checking. The framework adopts LTL (Linear Temporal Logic) as a specification language for flexibly specifying complex delivery requirements in the setting of milk-run logistics. The framework defines the notion of goptimal truck routesh which satisfy given delivery requirements in a route map, by applying the bounded semantics of LTL. We develop an automated route planner based on the framework using the NuSMV model checker as an early implementation. We evaluate the feasibility of the implementation design by analyzing its computational complexity and showing experimental results.","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114216587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Place Recommendation from Check-in Spots on Location-Based Online Social Networks 在基于位置的在线社交网络上从签到点推荐地点
2012 Third International Conference on Networking and Computing Pub Date : 2012-12-05 DOI: 10.1109/ICNC.2012.29
Hongbo Chen, Zhiming Chen, M. Arefin, Y. Morimoto
{"title":"Place Recommendation from Check-in Spots on Location-Based Online Social Networks","authors":"Hongbo Chen, Zhiming Chen, M. Arefin, Y. Morimoto","doi":"10.1109/ICNC.2012.29","DOIUrl":"https://doi.org/10.1109/ICNC.2012.29","url":null,"abstract":"With rapid growth of the GPS enabled mobile device, location-based online social network services become more and more popular, and allow their users to share life experiences with location information. In this paper, we considered a method for recommending places to a user based on spatial databases of location-based online social network services. We used a user-based collaborative filtering method to make a set of recommended places. In the proposed method, we calculate similarity of users' check-in activities not only their positions but also their semantics such as \"shopping\", \"eating\", \"drinking\", and so forth. We empirically evaluated our method in a real database and found that it outperforms the naive singular value decomposition collaborative filtering recommendation by comparing the prediction accuracy.","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117168494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Graph Augmentation Problem with Diameter Requirements 具有直径要求的图增广问题
2012 Third International Conference on Networking and Computing Pub Date : 2012-12-05 DOI: 10.1109/ICNC.2012.75
Toshimasa Ishii
{"title":"Graph Augmentation Problem with Diameter Requirements","authors":"Toshimasa Ishii","doi":"10.1109/ICNC.2012.75","DOIUrl":"https://doi.org/10.1109/ICNC.2012.75","url":null,"abstract":"In communication networks, the distance between two nodes is one measure of transfer delay between them. Thus, it is required that the diameter of the network, which is defined as the maximum distance between every two nodes in it, is relatively small. This paper surveys the computational results on graph augmentation problems which model network design problems with diameter requirements, initiated in [F. R. K. Chung and M. R. Garey, \"Diameter bounds for altered graphs,\" J. Graph Theory, vol. 8, pp. 511-534, 1984].","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"796 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123907268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The K Computer and its Application K 电脑及其应用
2012 Third International Conference on Networking and Computing Pub Date : 2012-12-05 DOI: 10.1109/ICNC.2012.13
M. Yokokawa
{"title":"The K Computer and its Application","authors":"M. Yokokawa","doi":"10.1109/ICNC.2012.13","DOIUrl":"https://doi.org/10.1109/ICNC.2012.13","url":null,"abstract":"The K computer is a distributed memory super-computer system with 82,944 compute nodes and 5,184 I/O nodes that was jointly developed by RIKEN and Fujitsu as a Japanese national project. Its development began in 2006 and was completed in June, 2012. By achieving the LINPACK performance of 10.51 peta-FLOPS, the K computer ranked first for two consecutive TOP500 list in June and November 2011. During its adjustment, part of the K computer was served, gradually increasing computing resources, to experts in computational science as a trial and was used for performance optimization of users' application codes.","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127661636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Mobile Agent Creation Mechanism for Service Collection and Dissemination in Heterogeneous MANETs 异构manet中服务收集与传播的移动代理创建机制
2012 Third International Conference on Networking and Computing Pub Date : 2012-12-05 DOI: 10.1109/ICNC.2012.60
Shuhei Ishizuka, T. Ohta, Y. Kakuda
{"title":"A Mobile Agent Creation Mechanism for Service Collection and Dissemination in Heterogeneous MANETs","authors":"Shuhei Ishizuka, T. Ohta, Y. Kakuda","doi":"10.1109/ICNC.2012.60","DOIUrl":"https://doi.org/10.1109/ICNC.2012.60","url":null,"abstract":"A Mobile Ad hoc Network (shortly, MANET) that consists of mobile nodes (shortly, nodes) is one of autonomous decentralized networks. Since the network topology changes frequently due to the node mobility in MANETs, it is difficult for each node to grasp the service in MANETs. In order to solve this problem, we use mobile agents for service informations dissemination. In heterogeneous MANETs, mobile agents can migrate between different MANETs only through Network Gateways(shortly, NwGWs). In this paper, we propose a mobile agent creation mechanism for service collection and dissemination in heterogeneous MANETs. In addition, we conducted the simulation experiments to evaluate the proposed scheme.","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130338367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Computational Complexity Analysis and Algorithm Design for Combinatorial Optimization Problems 组合优化问题的计算复杂度分析与算法设计
2012 Third International Conference on Networking and Computing Pub Date : 2012-12-05 DOI: 10.1109/ICNC.2012.12
Toshimasa Watanabe
{"title":"Computational Complexity Analysis and Algorithm Design for Combinatorial Optimization Problems","authors":"Toshimasa Watanabe","doi":"10.1109/ICNC.2012.12","DOIUrl":"https://doi.org/10.1109/ICNC.2012.12","url":null,"abstract":"The paper shows summary of the author's research subjects from 1973 through 2012. Additional explanation on these subjects and related references are omitted because of space limitation. They will be given at presentation.","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127212356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation and Evaluation of Modular Multiplication Based on Coarsely Integrated Operand Scanning 基于粗积分操作数扫描的模乘法的实现与评价
2012 Third International Conference on Networking and Computing Pub Date : 2012-12-05 DOI: 10.1109/ICNC.2012.65
Satoru Tamura, Chikatoshi Yamada, S. Ichikawa
{"title":"Implementation and Evaluation of Modular Multiplication Based on Coarsely Integrated Operand Scanning","authors":"Satoru Tamura, Chikatoshi Yamada, S. Ichikawa","doi":"10.1109/ICNC.2012.65","DOIUrl":"https://doi.org/10.1109/ICNC.2012.65","url":null,"abstract":"RSA encryption is widely used in public crypto systems. However, according to recent development of computer processing, decipher can be executed in 512-bit key length. Therefore, it has been recommended to move to RSA 2048 from RSA 1024. However, as key length increases, the amount of computation is increased for encryption. Consequently, we consider hardware implementation of processing units. In hardware implementation, the processing speed and circuit size is a trade-off relationship. In embedded devices as the IC card reader, severe resource constraints will be imposed. In this paper, based on Coarsely Integrated Operand Scanning, which is one of Montgomery multiplication, we suggest the modular multiplication circuit architecture for adjusting the trade-off processing speed and circuit size. We design modular multiplication circuit using the proposed architecture at 4-radix. Utilization for the circuit as follows: 146 slices, 461 registers, 685 look-up tables, which allows a compact implementation on the FPGA with Spartan-6 XC6SLX45T. As results, maximum operating frequency is 213.022[MHz], processing time is 41.47[μs], it was achieved 30 times faster compared with software processing.","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115128464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient Implementations of the Approximate String Matching on the Memory Machine Models 内存机模型上近似字符串匹配的高效实现
2012 Third International Conference on Networking and Computing Pub Date : 2012-12-05 DOI: 10.1109/ICNC.2012.43
K. Nakano
{"title":"Efficient Implementations of the Approximate String Matching on the Memory Machine Models","authors":"K. Nakano","doi":"10.1109/ICNC.2012.43","DOIUrl":"https://doi.org/10.1109/ICNC.2012.43","url":null,"abstract":"The Discrete Memory Machine (DMM) and the Unified Memory Machine (UMM) are theoretical parallel computing models that capture the essence of the shared memory access and the global memory access of GPUs. The approximate string matching for two strings X and Y is a task to find a sub string of Y most similar to X. The main contribution of this paper is to show efficient implementations of approximate string matching on the memory machine models. Our best implementation for strings X and Y with length m and n (m≤n), respectively, runs in O(mn/w + ml) time units using n threads both on the DMM on the UMM with width w and latency l.","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"396 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114958722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信