世界中学生文摘最新文献

筛选
英文 中文
Poster: Realizing All-spectrum Cognitive Networking on a Software-defined Radio Testbed 海报:在软件定义无线电测试台上实现全频谱认知网络
世界中学生文摘 Pub Date : 2015-09-11 DOI: 10.1145/2801694.2802148
George Sklivanitis, Emrecan Demirors, S. Batalama, D. Pados, T. Melodia
{"title":"Poster: Realizing All-spectrum Cognitive Networking on a Software-defined Radio Testbed","authors":"George Sklivanitis, Emrecan Demirors, S. Batalama, D. Pados, T. Melodia","doi":"10.1145/2801694.2802148","DOIUrl":"https://doi.org/10.1145/2801694.2802148","url":null,"abstract":"We implement and real-time demonstrate for the first time ROCH; a distributed cognitive algorithm that maximizes secondary network throughput, while at the same time avoids interference to primary users through joint Routing and cOde-waveform CHannelization. ROCH performance is evaluated on a $7$-node software-defined radio testbed using the open-source radio framework, GNU Radio, and Universal Software Radio Peripherals (USRP-N$210$s). The implementation of ROCH is facilitated by the architectural abstractions of the RcUBe radio framework, that provides real-time reconfigurability at the PHY, MAC, and network layers of the protocol stack.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"275 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2015-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73559152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Guard Mounting: Reorganizations to Mitigate DDoS Attacks over Identity Providers Clustering 保护安装:重组以减轻身份提供者集群上的DDoS攻击
世界中学生文摘 Pub Date : 2015-09-11 DOI: 10.1145/2801694.2801709
Ricardo Macedo, A. Santos, Y. Ghamri-Doudane, M. N. Lima
{"title":"Guard Mounting: Reorganizations to Mitigate DDoS Attacks over Identity Providers Clustering","authors":"Ricardo Macedo, A. Santos, Y. Ghamri-Doudane, M. N. Lima","doi":"10.1145/2801694.2801709","DOIUrl":"https://doi.org/10.1145/2801694.2801709","url":null,"abstract":"Under the increasing popularization of portable and mobile devices, as well as the positive trends to the Internet of Everything, Identity Management systems gain a crucial role in integrating different administrative domains towards a global ubiquitous computing. Denial-of-Service (DoS) attacks can make IdM operations unavailable, preventing the use of computational resources by legitimate users. This work presents SAMOS, a novel Scheme for DoS Attacks Mitigation by the reOrganization and optimization of the IdM System. SAMOS optimizes the reorganization of the IdM system components founded on optimization techniques, minimizing DoS effects and improving the system lifetime. Results considering data from a real IdM system indicate the scheme viability and benefits.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2015-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78440587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Poster: Can Smart Devices Protect Us from Violent Crime? 海报:智能设备能保护我们免受暴力犯罪吗?
世界中学生文摘 Pub Date : 2015-09-11 DOI: 10.1145/2801694.2802146
Alan Ferrari, D. Puccinelli, S. Giordano
{"title":"Poster: Can Smart Devices Protect Us from Violent Crime?","authors":"Alan Ferrari, D. Puccinelli, S. Giordano","doi":"10.1145/2801694.2802146","DOIUrl":"https://doi.org/10.1145/2801694.2802146","url":null,"abstract":"To explore the applicability of mobile smart devices to personal protection against violent crime, we propose a system that can detect the onset of hazardous situations involving violent crime by leveraging standard activity recognition strategies on smartphones and sensory inputs from wearable devices, as well as send help requests to alert the authorities.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2015-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87469737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Poster: On the Quest for Representative Mobile Datasets 海报:对代表性移动数据集的探索
世界中学生文摘 Pub Date : 2015-09-11 DOI: 10.1145/2801694.2802147
Guangshuo Chen, A. C. Viana
{"title":"Poster: On the Quest for Representative Mobile Datasets","authors":"Guangshuo Chen, A. C. Viana","doi":"10.1145/2801694.2802147","DOIUrl":"https://doi.org/10.1145/2801694.2802147","url":null,"abstract":"Mobile datasets are often incomplete or have heterogeneous spatiotemporal resolutions, e.g., a dataset is often aggregated or in lack of fields. We create a reliable dataset describing mobile data traffic in individual's spatiotemporal view. We focus on individuals having enough geographical information and merge their call records from one dataset with the data traffic records extracted from another dataset. The resulting dataset contains data session records associated with time and location fields.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2015-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87744591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demo: On the Monitoring of YouTube QoE in Cellular Networks from End-devices 演示:从终端设备监控蜂窝网络中的YouTube QoE
世界中学生文摘 Pub Date : 2015-09-11 DOI: 10.1145/2801694.2802142
Michael Seufert, Florian Wamser, P. Casas, R. Irmer, P. Tran-Gia, R. Schatz
{"title":"Demo: On the Monitoring of YouTube QoE in Cellular Networks from End-devices","authors":"Michael Seufert, Florian Wamser, P. Casas, R. Irmer, P. Tran-Gia, R. Schatz","doi":"10.1145/2801694.2802142","DOIUrl":"https://doi.org/10.1145/2801694.2802142","url":null,"abstract":"In this demonstration, we present YoMoApp (YouTube Performance Monitoring Application), a passive measurement application for client side monitoring of YouTube video streaming on mobile Android devices. The application uses the YouTube mobile website and the HTML5 API to exactly replicate the well-known YouTube service, which employs HTTP adaptive streaming (HAS) technology based on resolution adaptation. It monitors and stores multiple Key Performance Indicators (KPIs) of the video streaming via the YouTube API (i.e., player state/events, buffer, and video quality level), which allow to analyze the QoE of adaptive video streaming sessions.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"1879 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2015-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86532021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Poster: Krowd: A Key-Value Store for Crowded Venues 海报:人群:拥挤场所的键值存储
世界中学生文摘 Pub Date : 2015-09-11 DOI: 10.1145/2801694.2802145
Utsav Drolia, Nathan D. Mickulicz, R. Gandhi, P. Narasimhan
{"title":"Poster: Krowd: A Key-Value Store for Crowded Venues","authors":"Utsav Drolia, Nathan D. Mickulicz, R. Gandhi, P. Narasimhan","doi":"10.1145/2801694.2802145","DOIUrl":"https://doi.org/10.1145/2801694.2802145","url":null,"abstract":"Attendees of live events want to capture and share rich content using their mobile devices, during the events. However, the infrastructure at venues that host live events provide poor, low-bandwidth connectivity. Instead of relying on infrastructure provided by the venue, we propose to stand up a temporary \"infrastructure\" using the very devices that need it, to enable content-sharing with nearby devices. To this end, we developed Krowd, a novel system that provides a key-value store abstraction to applications that share content among local, nearby users. We evaluated Krowd using over 200 hours of real-world traces from sold-out NBA and NHL playoffs and show that it is 50% faster and consumes 50% less bandwidth than alternative systems. We believe that Krowd is the only decentralized and distributed system to provide a key-value store made for neighboring mobile devices and of neighboring mobile devices.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2015-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88394761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Paper Session 3: Performance 会议详情:论文会议3:性能
世界中学生文摘 Pub Date : 2015-09-11 DOI: 10.1145/3251624
{"title":"Session details: Paper Session 3: Performance","authors":"","doi":"10.1145/3251624","DOIUrl":"https://doi.org/10.1145/3251624","url":null,"abstract":"","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2015-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78420230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AntMonitor: Network Traffic Monitoring and Real-Time Prevention of Privacy Leaks in Mobile Devices AntMonitor:移动设备的网络流量监控和实时隐私泄露预防
世界中学生文摘 Pub Date : 2015-09-11 DOI: 10.1145/2801694.2801707
A. Shuba, Anh Le, Minas Gjoka, Janus Varmarken, Simon Langhoff, A. Markopoulou
{"title":"AntMonitor: Network Traffic Monitoring and Real-Time Prevention of Privacy Leaks in Mobile Devices","authors":"A. Shuba, Anh Le, Minas Gjoka, Janus Varmarken, Simon Langhoff, A. Markopoulou","doi":"10.1145/2801694.2801707","DOIUrl":"https://doi.org/10.1145/2801694.2801707","url":null,"abstract":"Mobile devices play an essential role in the Internet today, and there is an increasing interest in using them as a vantage point for network measurement from the edge. At the same time, these devices store personal, sensitive information, and there is a growing number of applications that leak it. We propose AntMonitor -- the first system of its kind that supports (i) collection of large-scale, semantic-rich network traffic in a way that respects users' privacy preferences and (ii) detection and prevention of leakage of private information in real time. The first property makes AntMonitor a powerful tool for network researchers who want to collect and analyze large-scale yet fine-grained mobile measurements. The second property can work as an incentive for using AntMonitor and contributing data for analysis. As a proof-of-concept, we have developed a prototype of AntMonitor, deployed it to monitor 9 users for 2 months, and collected and analyzed 20 GB of mobile data from 151 applications. Preliminary results show that fine-grained data collected from AntMonitor could enable application classification with higher accuracy than state-of-the-art approaches. In addition, we demonstrated that AntMonitor could help prevent several apps from leaking private information over unencrypted traffic, including phone numbers, emails, and device identifiers.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2015-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81920312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Poster: Enabling Hands-free Drawing on WiFi Devices 海报:在WiFi设备上实现免提绘图
世界中学生文摘 Pub Date : 2015-09-11 DOI: 10.1145/2801694.2802144
Li Sun, Souvik Sen, Dimitrios Koutsonikolas, Kyu-Han Kim
{"title":"Poster: Enabling Hands-free Drawing on WiFi Devices","authors":"Li Sun, Souvik Sen, Dimitrios Koutsonikolas, Kyu-Han Kim","doi":"10.1145/2801694.2802144","DOIUrl":"https://doi.org/10.1145/2801694.2802144","url":null,"abstract":"We present the high-level design of WiDraw, the first 3D hand motion tracking system using COTS WiFi cards, proposed in [3]. WiDraw can track hand gestures without a priori learning or requiring the user to hold any hardware. It can be implemented on existing mobile devices using only a software patch. WiDraw exploits the Angle-of-Arrival values of incomingWiFi signals at aWiFi device and enables hand trajectory tracking in both LOS and NLOS scenarios. WiDraw's high tracking accuracy allows the users to send arbitrary input to their WiFi devices, opening up a whole new class of applications in human-computer interactions.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2015-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87169053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Synergy between Nulling and Power Allocation in OFDM Systems OFDM系统中零值与功率分配的协同作用
世界中学生文摘 Pub Date : 2015-09-11 DOI: 10.1145/2801694.2801701
G. Nikolaidis, M. Handley, K. Jamieson, B. Karp
{"title":"On the Synergy between Nulling and Power Allocation in OFDM Systems","authors":"G. Nikolaidis, M. Handley, K. Jamieson, B. Karp","doi":"10.1145/2801694.2801701","DOIUrl":"https://doi.org/10.1145/2801694.2801701","url":null,"abstract":"The advantages of 802.11 wireless networks have led to their widespread use which in turn has intensified the problem of interference, especially in dense urban settings. Such networks are close to one another but not centrally managed and do not share any high-speed wired backend. We present a system that leverages subcarrier selection, power allocation, nulling and multi-stream transmission but most importantly does so in a loosely cooperative manner between participating hosts, leading to considerable throughput improvements over the status-quo.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2015-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89419467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信