2008 International Conference on Information Networking最新文献

筛选
英文 中文
Localization of Sensor Nodes in Underwater Acoustic Sensor Networks Using Two Reference Points 基于两个参考点的水声传感器网络节点定位
2008 International Conference on Information Networking Pub Date : 2008-03-21 DOI: 10.1109/ICOIN.2008.4472770
J. Ko, Jongmin Shin, Cheeha Kim
{"title":"Localization of Sensor Nodes in Underwater Acoustic Sensor Networks Using Two Reference Points","authors":"J. Ko, Jongmin Shin, Cheeha Kim","doi":"10.1109/ICOIN.2008.4472770","DOIUrl":"https://doi.org/10.1109/ICOIN.2008.4472770","url":null,"abstract":"Underwater acoustic sensor networks (UWASN) is being actively researched for its broad spectrum of potential applications. Submarine or whale tracking can also be greatly leveraged by UWASN. These applications require localization of sensor nodes. We propose a novel scheme that minimizes the influence of node mobility inherent to underwater environment. We evaluate our method analytically, and show that it performs robustly in various network settings and environment.","PeriodicalId":447966,"journal":{"name":"2008 International Conference on Information Networking","volume":"53 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123440069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Hop-Count Based Congestion-Aware Multi-path Routing in Wireless Mesh Network 基于跳数的无线Mesh网络感知拥塞多径路由
2008 International Conference on Information Networking Pub Date : 2008-03-21 DOI: 10.1109/ICOIN.2008.4472752
Hung Quoc Vo, C. Hong
{"title":"Hop-Count Based Congestion-Aware Multi-path Routing in Wireless Mesh Network","authors":"Hung Quoc Vo, C. Hong","doi":"10.1109/ICOIN.2008.4472752","DOIUrl":"https://doi.org/10.1109/ICOIN.2008.4472752","url":null,"abstract":"In recent years, wireless mesh network (WMN) is a compelling topic to many network researchers due to its low cost in deployment, simplicity in installation and robustness in operation. However, existing routing protocols designed for MANET can not work efficiently in WMN because backbone in WMN formed by Mesh Router has very low mobility and are not put under power and memory constraint. In addition, they just concentrate on finding single path from the source to the destination while the characteristics of robustness of WMN require that every intermediate Mesh Router should establish several paths from itself to its desired destination. In our paper, we design a routing protocol that permits each MR to quickly discover multiple paths based on Hop Count metric to the Internet Gateways. Unfortunately, Hop Count does not take packet loss or bandwidth into account. It results in low throughput of a flow that follows the shortest path. A bandwidth estimation technique has been proposed to apply at each Mesh Router to allow it to predict congestion risk over its connected links and to select high available bandwidth link for forwarding packets. A detailed performance evaluation shows that the throughput increases greatly compared to pure AODV and AOMDV in high-loaded traffic scenario.","PeriodicalId":447966,"journal":{"name":"2008 International Conference on Information Networking","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114747336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Multicast Session Management and QoS Management for Multicast Group Communications 组播组通信的组播会话管理和QoS管理
2008 International Conference on Information Networking Pub Date : 2008-03-21 DOI: 10.1109/ICOIN.2008.4472806
Jungjin Park, Su-Jin Lee, H. Kahng
{"title":"Multicast Session Management and QoS Management for Multicast Group Communications","authors":"Jungjin Park, Su-Jin Lee, H. Kahng","doi":"10.1109/ICOIN.2008.4472806","DOIUrl":"https://doi.org/10.1109/ICOIN.2008.4472806","url":null,"abstract":"Conventional multicast group communications need a dynamic mechanism for group management according to the join/leave of receivers and for the modification of membership information and a QoS management for a reliable multicast group communication. The Group Management Protocol (GMP) is an application-layer control protocol to supports the group management and the membership management for the multicast group communications but GMP does not support the QoS management. Also, RSVP supports the QoS for a reliable multicast group communication but RSVP is limited for managing the group membership. Therefore, we need to manage the group membership together with the QoS for the multicast group communications. In this paper, we propose a reliable multicast session management protocol called Multicast Session Management Protocol (MSMP). MSMP should coordinate the group management and the QoS management. MSMP is an application layer control protocol for managing QoS. MSMP consists of a session management function and a QoS management function.","PeriodicalId":447966,"journal":{"name":"2008 International Conference on Information Networking","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122100198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Context-based Service Adaptation Platform: Improving the User Experience towards Mobile Location Services 基于上下文的业务适配平台:提升移动位置服务的用户体验
2008 International Conference on Information Networking Pub Date : 2008-03-21 DOI: 10.1109/ICOIN.2008.4472797
S. Schou
{"title":"Context-based Service Adaptation Platform: Improving the User Experience towards Mobile Location Services","authors":"S. Schou","doi":"10.1109/ICOIN.2008.4472797","DOIUrl":"https://doi.org/10.1109/ICOIN.2008.4472797","url":null,"abstract":"Back in 2000 and the following two or three years, mobile location services gained a great deal of interest and they were considered as one of the few service categories where users would be willing to pay for the usage. Since 2000 countless mobile location services have been launched in different parts of the world. However, the mobile location services have obviously not yet met the hyped expectation of mass-market adoption that was expressed in 2000. The lack of adaptability and offerings tailored to different user requirements in specific contexts of use is one of the factors inhibiting the take-off of the existing mobile location services both in Asia and Western Europe. Adaptability is envisioned by Wireless World Research Forum (WWRF) as one of the keys to the success of any service beyond year 2010 and one of the service capabilities that should be made available on the next generation wireless network suggested by International Telecommunication Union (ITU). This paper proposes a new conceptual platform for context-based service adaptation which is designed to be used in the open service environment of the next generation wireless network. The platform aims to add adaptability to the future mobile location services as a means of improving the possibility of the service being a success.","PeriodicalId":447966,"journal":{"name":"2008 International Conference on Information Networking","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120933373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Toward A Practical Scheme for IPSec Management 一种实用的IPSec管理方案
2008 International Conference on Information Networking Pub Date : 2008-03-21 DOI: 10.1109/ICOIN.2008.4472762
Qi Li, Mingwei Xu, Ke Xu
{"title":"Toward A Practical Scheme for IPSec Management","authors":"Qi Li, Mingwei Xu, Ke Xu","doi":"10.1109/ICOIN.2008.4472762","DOIUrl":"https://doi.org/10.1109/ICOIN.2008.4472762","url":null,"abstract":"IP Security (IPSec) is an important protection mechanism for securing the Internet communication. However, IPSec is a complex security protocol family, and the management issue is still a challenge for mass deployment. Many researchers have investigated the IPSec management issue with various approaches, the policy configuration and distribution issue remain to be efficiently resolved. A certificate-based scheme to manage IPSec endpoints is proposed in this paper. A Role-based Access Control (RBAC) model is introduced to simplify the process of policy configuration, and policy control mechanism is proposed to check whether new security association conforms to local security policies. The analysis of the scheme shows the flexibility and efficiency of our approach. Based on our proposed scheme, we implement a prototype system with the proof-of-concept and conduct experimental studies to demonstrate the feasibility and performance of our approach.","PeriodicalId":447966,"journal":{"name":"2008 International Conference on Information Networking","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129977925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy-Efficient Flooding Mechanisms for the Wireless Sensor Networks 无线传感器网络的节能泛洪机制
2008 International Conference on Information Networking Pub Date : 2008-03-21 DOI: 10.1109/ICOIN.2008.4472783
S. Arm, Yujin Lim, Hyun Yu
{"title":"Energy-Efficient Flooding Mechanisms for the Wireless Sensor Networks","authors":"S. Arm, Yujin Lim, Hyun Yu","doi":"10.1109/ICOIN.2008.4472783","DOIUrl":"https://doi.org/10.1109/ICOIN.2008.4472783","url":null,"abstract":"Most of the data transmissions in the sensor network are based on flooding. The original flooding causes the implosion and the overlap problems, so flooding may result in the reduced network lifetime of the sensor network with limited resources. Therefore, in order to reduce the overhead by flooding, we propose the flooding overlay structure (FOS) which adopts the concept of the overlay network so that the overhead caused by flooding can be reduced. We propose two types of FOS mechanisms, the centralized FOS (CFOS) and the distributed FOS (DFOS). CFOS is for the static sensor network in which the sink can select forwarding nodes more effectively. And DFOS is proposed for the more dynamic sensor network environment. To provide the network connectivity in DFOS, the concept of the notice delay is introduced. We have carried out simulations for our FOS mechanisms and the original flooding, and shown that our FOS mechanisms outperform the original flooding in many performance aspects.","PeriodicalId":447966,"journal":{"name":"2008 International Conference on Information Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128806275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Leveraging Missing Values in Call Detail Record Using Naïve Bayes for Fraud Analysis 利用Naïve贝叶斯欺诈分析呼叫详细记录中的缺失值
2008 International Conference on Information Networking Pub Date : 2008-03-21 DOI: 10.1109/ICOIN.2008.4472791
Khairul Nizam Bin Baharim, M. S. Kamaruddin, Faeizah Jusof
{"title":"Leveraging Missing Values in Call Detail Record Using Naïve Bayes for Fraud Analysis","authors":"Khairul Nizam Bin Baharim, M. S. Kamaruddin, Faeizah Jusof","doi":"10.1109/ICOIN.2008.4472791","DOIUrl":"https://doi.org/10.1109/ICOIN.2008.4472791","url":null,"abstract":"In Telecom Fraud Management System (TFMS), the corrupted and missing values in call detail record (CDR) information are filtrated by rule-based classifier into the rejection proportion, as most of fraud detection approaches such as customer profiling and learning-based fraud detection technique were demanded clean information. Additionally, very few research works had discussed the issue of fraud detection in the area of corrupted CDR, due to its possibility yielded by lack of telecom equipment. In this paper, we present the leveraging missing values method, using the Naive Bayes approach posterior to rule-based classifier to analyze the probability of corrupted and missing values in CDR which then consequently led to the discovery of useable record lies in rejected CDR. This approach differs from other missing value handling and fraud analysis research where it does not attempt to treat the missing values; instead, leveraging it into the probabilistic model for fraud analysis. In this paper, we also reveal an impact of the missing values in telecommunication services and significantly vacant an avenues future work in fraud detection research.","PeriodicalId":447966,"journal":{"name":"2008 International Conference on Information Networking","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133589762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Energy Analysis of Multimedia Video Decoding on Embedded Systems 嵌入式系统下多媒体视频解码的能量分析
2008 International Conference on Information Networking Pub Date : 2008-03-21 DOI: 10.1109/ICOIN.2008.4472815
Chu-Hsing Lin, Jung-Chun Liu, Mao-Hua Cheng
{"title":"Energy Analysis of Multimedia Video Decoding on Embedded Systems","authors":"Chu-Hsing Lin, Jung-Chun Liu, Mao-Hua Cheng","doi":"10.1109/ICOIN.2008.4472815","DOIUrl":"https://doi.org/10.1109/ICOIN.2008.4472815","url":null,"abstract":"Expanding components and applications on hand-held devices include radio, camera functions, audio, and video media, etc. Due to the complex computing characteristic of video decoding, the video application consumes large amount of energy and demands strict strategies for power management. Codecs are used to encode video media from original sources of films; lots of new compression codecs are released in recent years. In this paper, we aim to find the optimal video codecs on embedded systems from analyses of consumption of energy. Experiments have been done to investigate the effects of various codecs, file formats, and parameters of codecs.","PeriodicalId":447966,"journal":{"name":"2008 International Conference on Information Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129986843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cooperative Transmission Strategy for Video-on-Demand System 视频点播系统的协同传输策略
2008 International Conference on Information Networking Pub Date : 2008-03-21 DOI: 10.1109/ICOIN.2008.4472803
K. Ho, K. Lo, Jian Feng
{"title":"Cooperative Transmission Strategy for Video-on-Demand System","authors":"K. Ho, K. Lo, Jian Feng","doi":"10.1109/ICOIN.2008.4472803","DOIUrl":"https://doi.org/10.1109/ICOIN.2008.4472803","url":null,"abstract":"Skyscraper broadcast (SB) is one of the effective ways to provide a scalable solution for video-on-demand (VoD) services. Originally, SB was only designed for supporting a near-VoD service to clients. In this paper, we propose a new transmission scheme called skyscraper-based peer-to-peer broadcasting (SPB) to realize a true-VoD service in SB. It is accomplished by shifting the duty of the first segment transmission to the clients in peer-to-peer (P2P) manner. It is found from the results that the proposed scheme is superior to the existing strategies that the transmission cost of the system and that of the central server can be reduced up to 7% and 30% respectively.","PeriodicalId":447966,"journal":{"name":"2008 International Conference on Information Networking","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123801245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic Resource Allocation in Cellular Radio Networks with Downlink Relaying 带下行中继的蜂窝无线网络动态资源分配
2008 International Conference on Information Networking Pub Date : 2008-03-21 DOI: 10.1109/ICOIN.2008.4472760
Hyunduk Jung, Eunhyun Kwon, Inkeun Cho, Sung-Gook Lim, Jaiyong Lee
{"title":"Dynamic Resource Allocation in Cellular Radio Networks with Downlink Relaying","authors":"Hyunduk Jung, Eunhyun Kwon, Inkeun Cho, Sung-Gook Lim, Jaiyong Lee","doi":"10.1109/ICOIN.2008.4472760","DOIUrl":"https://doi.org/10.1109/ICOIN.2008.4472760","url":null,"abstract":"In this paper, we propose dynamic resource allocation with spatial reuse to improve total system throughput in multi-user system and multi-hop communication. The comparison of optimal and heuristic reuse scheme shows the heuristic reuse scheme is still good enough with low complexity. The simulation result shows that dynamic resource reuse scheme among fixed RSs increases the system throughput.","PeriodicalId":447966,"journal":{"name":"2008 International Conference on Information Networking","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134212194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信