2010 IEEE International Conference on Communications最新文献

筛选
英文 中文
Sampling Techniques to Accelerate Pattern Matching in Network Intrusion Detection Systems 加速网络入侵检测系统模式匹配的采样技术
2010 IEEE International Conference on Communications Pub Date : 2010-05-23 DOI: 10.1109/ICC.2010.5501751
D. Ficara, G. Antichi, A. D. Pietro, S. Giordano, G. Procissi, F. Vitucci
{"title":"Sampling Techniques to Accelerate Pattern Matching in Network Intrusion Detection Systems","authors":"D. Ficara, G. Antichi, A. D. Pietro, S. Giordano, G. Procissi, F. Vitucci","doi":"10.1109/ICC.2010.5501751","DOIUrl":"https://doi.org/10.1109/ICC.2010.5501751","url":null,"abstract":"Modern network devices need to perform deep packet inspection at high speed for security and application-specific services. Instead of standard strings to represent the dataset to be matched, state-of-the-art systems adopt regular expressions, due to their high expressive power. The current trend is to use Deterministic Finite Automata (DFAs) to match regular expressions. However, while the problem of the large memory consumption of DFAs has been solved in many different ways, only a few works have focused on increasing the lookup speed. This paper introduces a novel yet simple idea to accelerate DFAs for security applications: payload sampling. Our approach allows to skip a large portion of the text, thus processing less bytes. The price to pay is a slight number of false alarms which require a confirmation stage. Therefore, we propose a double-stage matching scheme providing two new different automata. Results show a significant speed-up in regular traffic processing, thus confirming the effectiveness of the approach.","PeriodicalId":6405,"journal":{"name":"2010 IEEE International Conference on Communications","volume":"45 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83004045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Max-Min Fair Multipath Routing with Physical Interference Constraints for Multihop Wireless Networks 多跳无线网络中具有物理干扰约束的最大最小公平多径路由
2010 IEEE International Conference on Communications Pub Date : 2010-05-23 DOI: 10.1109/ICC.2010.5502063
P. Thulasiraman, Jiming Chen, Xuemin Shen
{"title":"Max-Min Fair Multipath Routing with Physical Interference Constraints for Multihop Wireless Networks","authors":"P. Thulasiraman, Jiming Chen, Xuemin Shen","doi":"10.1109/ICC.2010.5502063","DOIUrl":"https://doi.org/10.1109/ICC.2010.5502063","url":null,"abstract":"Fairness and system throughput, influenced by wireless interference, are major objectives of resource allocation in wireless networks. Whereas traditionally max-min fairness protocols have been developed for wired networks (where interference is not a factor for network performance), in this paper we investigate the problem of flow routing and fair bandwidth allocation under the constraints of the physical interference model for multihop wireless networks. A max-min fair (MMF) routing algorithm under physical interference constraints is proposed where multiple candidate paths coexist for each user to the base station. The algorithm is formulated as a multicommodity flow problem where the lexicographically largest bandwidth allocation vector is found among all optimal allocation vectors. We compare our approach with two MMF interference routing algorithms in the literature that use the protocol interference model to garner fair bandwidth allocation. We show that our algorithm performs better in terms of blocking probability, bandwidth usage and link load.","PeriodicalId":6405,"journal":{"name":"2010 IEEE International Conference on Communications","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85548645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Tractable Method for Constrained Resource Sharing in OFDMA Wireless Mesh Networks 一种易于处理的OFDMA无线Mesh网络约束资源共享方法
2010 IEEE International Conference on Communications Pub Date : 2010-05-23 DOI: 10.1109/ICC.2010.5502032
F. Brah, L. Vandendorpe, V. Ramon
{"title":"A Tractable Method for Constrained Resource Sharing in OFDMA Wireless Mesh Networks","authors":"F. Brah, L. Vandendorpe, V. Ramon","doi":"10.1109/ICC.2010.5502032","DOIUrl":"https://doi.org/10.1109/ICC.2010.5502032","url":null,"abstract":"This paper presents a novel fair scheme for resource sharing between nodes in OFDMA mesh networks. The problem is to maximize the overall system rate, under each user's maximal power and minimum rate constraints. To solve the underlying problem, we propose an approach that combines the merits of the well known Lagrange dual framework and the Lambert-W function. By using the Lambert-W function, resource allocation can not only be expressed in closed form but it can also quickly be determined without resorting to complex algorithms since a number of popular mathematical softwares, including Matlab, contain the Lambert-W function as an optimization component. Simulation results are provided to compare the performance of the proposed scheme with other allocation schemes.","PeriodicalId":6405,"journal":{"name":"2010 IEEE International Conference on Communications","volume":"1 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85559048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Overhearing-Based Scheme for Improving Data Persistence in Wireless Sensor Networks 一种基于窃听的无线传感器网络数据持久性改进方案
2010 IEEE International Conference on Communications Pub Date : 2010-05-23 DOI: 10.1109/ICC.2010.5502577
Junbin Liang, Jian-xin Wang, Jianer Chen
{"title":"An Overhearing-Based Scheme for Improving Data Persistence in Wireless Sensor Networks","authors":"Junbin Liang, Jian-xin Wang, Jianer Chen","doi":"10.1109/ICC.2010.5502577","DOIUrl":"https://doi.org/10.1109/ICC.2010.5502577","url":null,"abstract":"How to improve the data persistence, i.e., the availability of all source data, is an important issue in wireless sensor networks. The issue requires that each source node can disseminate its data (packet) to a subset of nodes in the network for effective storage. In this paper, a distributed scheme based on LT(Luby Transform)-codes, named LTSIDP, is proposed. LT codes are the first rateless erasure codes that are very efficient as the amount of data grows. In LTSIDP, each node uses overhearing to get information whether a packet has been transmitted by one of its neighbors. When a node needs to transmit a packet, it randomly chooses one of its neighbors that does not transmit the packet as receiver. On the other hand, each node can compute a key parameter of LT codes by using some properties of the packet transmission mechanism, and then store the data accordingly. After the process of storage is finished, a collector (e.g., a motor vehicle) can recover all data by visiting a small subset of nodes. To the best of our knowledge, LTSIDP is the first scheme that uses overhearing to improve the data persistence. Theoretical analyses and simulations show that LTSIDP can achieve higher data persistence and energy efficiency than existing schemes.","PeriodicalId":6405,"journal":{"name":"2010 IEEE International Conference on Communications","volume":"117 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85791579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Decoding of Differential OSTBC with Non-Unitary Constellations Using Multiple Received Data Blocks 利用多接收数据块解码非酉星座差分OSTBC
2010 IEEE International Conference on Communications Pub Date : 2010-05-23 DOI: 10.1109/ICC.2010.5501887
M. Bhatnagar, A. Hjørungnes
{"title":"Decoding of Differential OSTBC with Non-Unitary Constellations Using Multiple Received Data Blocks","authors":"M. Bhatnagar, A. Hjørungnes","doi":"10.1109/ICC.2010.5501887","DOIUrl":"https://doi.org/10.1109/ICC.2010.5501887","url":null,"abstract":"In this paper, we propose a maximum likelihood~(ML) decoder for differentially encoded orthogonal space-time block codes (OSTBCs) based on multiple received data blocks. The proposed ML decoder differs from the existing ML decoders of differential OSTBC as follows: 1) Most existing ML decoders are derived on the basis of emph{two} consecutively received data matrices, whereas the proposed decoder takes emph{multiple} consecutively received data matrices into account. 2) One existing ML decoder considers multiple consecutively received specific differential OSTBC using emph{two} transmit antennas and is applicable to $M$-PSK constellation only, whereas the proposed ML decoder works with arbitrary differential OSTBCs using arbitrary number of transmit and receive antennas and arbitrary constellations which do not include zero. We have also derived an upper bound of the pairwise error probability (PEP) of the proposed ML decoder for differentially encoded orthogonal STBC (OSTBC) with $M$-QAM constellation over Rayleigh fading channels.","PeriodicalId":6405,"journal":{"name":"2010 IEEE International Conference on Communications","volume":"4 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86057854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance Comparison of Different Correlation Techniques for the AltBOC Modulation in Multipath Environments 多径环境下AltBOC调制不同相关技术的性能比较
2010 IEEE International Conference on Communications Pub Date : 2010-05-23 DOI: 10.1109/ICC.2010.5502625
Y. Tawk, C. Botteron, A. Jovanovic, P. Farine
{"title":"Performance Comparison of Different Correlation Techniques for the AltBOC Modulation in Multipath Environments","authors":"Y. Tawk, C. Botteron, A. Jovanovic, P. Farine","doi":"10.1109/ICC.2010.5502625","DOIUrl":"https://doi.org/10.1109/ICC.2010.5502625","url":null,"abstract":"In this paper, different correlation techniques (narrow correlator, double delta correlator and subcarrier processing) that can be applied to the new Galileo alternate binary offset carrier AltBOC(15,10) modulation are discussed with respect to their functionality, implementation, and multipath mitigation performance. Moreover, effects of the receiver parameters (precorrelation bandwidth, spacing between correlators) on the ranging errors are also presented. The performance of the multipath mitigation concepts is illustrated in 2D and 3D multipath error envelopes assuming multipath scenarios with one and two multipath components and constant signal attenuation factors. The main purpose of this paper is to provide a better understanding of the performance of the AltBOC modulation and the effect of multipath on code and carrier measurements for different multipath environments, and thus help the receiver designers to select the best correlation technique for their particular applications.","PeriodicalId":6405,"journal":{"name":"2010 IEEE International Conference on Communications","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84179213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Modeling Delivery Delay for Flooding in Mobile Ad Hoc Networks 移动Ad Hoc网络中泛洪传递延迟建模
2010 IEEE International Conference on Communications Pub Date : 2010-05-23 DOI: 10.1109/ICC.2010.5502357
Taesoo Jun, Nirmalya Roy, Christine Julien
{"title":"Modeling Delivery Delay for Flooding in Mobile Ad Hoc Networks","authors":"Taesoo Jun, Nirmalya Roy, Christine Julien","doi":"10.1109/ICC.2010.5502357","DOIUrl":"https://doi.org/10.1109/ICC.2010.5502357","url":null,"abstract":"Mobile ad hoc networks (MANETs) can have widely varying characteristics under different deployments, and previous studies show that the characteristics impact the behavior of routing protocols for MANETs. To deploy applications successfully in MANETs, application developers need to comprehend the potential behavior of any underlying protocol used. In mobile networks, a major component of many of these routing protocols is some form of flooding, which facilitates message delivery over an entire network in a relatively reliable way. Several MANET protocols use flooding to support the distribution of route request messages as well as delivering broadcast packets. Therefore, to developers of applications for MANETs, a major task in understanding MANET protocols is estimating the performance of flooding in a given operating environment. In this work, we develop an analytical model for the delay experienced in flooding a message. We model the one hop delay of a flooding message in MANETs in terms of parameters that can be acquired either from a system configuration or from application designers.","PeriodicalId":6405,"journal":{"name":"2010 IEEE International Conference on Communications","volume":"102 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84194086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
NS2 Extensions for the Simulation of RDM and G-RDM in DS-TE Networks DS-TE网络中RDM和G-RDM仿真的NS2扩展
2010 IEEE International Conference on Communications Pub Date : 2010-05-23 DOI: 10.1109/ICC.2010.5502420
D. Adami, C. Callegari, S. Giordano, M. Pagano
{"title":"NS2 Extensions for the Simulation of RDM and G-RDM in DS-TE Networks","authors":"D. Adami, C. Callegari, S. Giordano, M. Pagano","doi":"10.1109/ICC.2010.5502420","DOIUrl":"https://doi.org/10.1109/ICC.2010.5502420","url":null,"abstract":"DiffServ-aware MPLS-TE (DS-TE) significantly enhances the MPLS-TE architecture by enabling bandwidth reservation on a per-class basis. More specifically, to this aim, the so-called Bandwidth Constraint Models (BCMs) are introduced as a key architectural element. This paper describes a new NS2 module that offers a complete support for the DS-TE architecture including the standard BCMs (MAM and RDM) and a new BCM (G-RDM), recently proposed by the authors. Moreover, the paper shows the results of simulations carried out to evaluate the behaviour of the above mentioned BCMs in a real network scenario.","PeriodicalId":6405,"journal":{"name":"2010 IEEE International Conference on Communications","volume":"23 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77979634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Decoding Algorithm for the Davey-MacKay Construction 一种改进的Davey-MacKay结构解码算法
2010 IEEE International Conference on Communications Pub Date : 2010-05-23 DOI: 10.1109/ICC.2010.5502293
J. A. Briffa, H. G. Schaathun, S. Wesemeyer
{"title":"An Improved Decoding Algorithm for the Davey-MacKay Construction","authors":"J. A. Briffa, H. G. Schaathun, S. Wesemeyer","doi":"10.1109/ICC.2010.5502293","DOIUrl":"https://doi.org/10.1109/ICC.2010.5502293","url":null,"abstract":"The Deletion-Insertion Correcting Code construction proposed by Davey and MacKay consists of an inner code that recovers synchronization and an outer code that provides substitution error protection. The inner code uses low-weight codewords which are added (modulo two) to a pilot sequence. The receiver is able to synchronise on the pilot sequence in spite of the changes introduced by the added codeword. The original bit-level formulation of the inner decoder assumes that all bits in the sparse codebook are identically and independently distributed. Not only is this assumption inaccurate, but it also prevents the use of soft a- priori input to the decoder. We propose an alternative symbol-level inner decoding algorithm that takes the actual codebook into account. Simulation results show that the proposed algorithm has an improved performance with only a small penalty in complexity, and it allows other improvements using inner codes with larger minimum distance.","PeriodicalId":6405,"journal":{"name":"2010 IEEE International Conference on Communications","volume":"322 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77993205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Distributed Differential Space-Time Spreading for the Asynchronous Relay Aided Interference-Free Cooperative CDMA Uplink 异步中继辅助无干扰协同CDMA上行链路的分布式差分时空扩展
2010 IEEE International Conference on Communications Pub Date : 2010-05-23 DOI: 10.1109/ICC.2010.5502096
S. Sugiura, Sheng Chen, L. Hanzo
{"title":"Distributed Differential Space-Time Spreading for the Asynchronous Relay Aided Interference-Free Cooperative CDMA Uplink","authors":"S. Sugiura, Sheng Chen, L. Hanzo","doi":"10.1109/ICC.2010.5502096","DOIUrl":"https://doi.org/10.1109/ICC.2010.5502096","url":null,"abstract":"In this paper, we propose a differential Space-Time Coding (STC) scheme designed for asynchronous cooperative networks, where neither channel estimation nor symbol-level synchronization is required at the cooperating nodes. More specifically, our system employs differential encoding during the broadcast phase and a Space-Time Spreading (STS)-based amplify-and-forward scheme during the cooperative phase in conjunction with interference rejection Direct Sequence (DS) spreading codes, namely Loosely Synchronized (LS) codes. The LS codes exhibit a so-called Interference Free Window (IFW), where both the autocorrelation and cross-correlation values of the codes become zero. The IFW allows us to eliminate both the Multi-User Interference (MUI) as well as the potential dispersion-induced orthogonality degradation of the cooperative space-time codeword and the interference imposed by the asynchronous transmissions of the relay nodes. Furthermore, the destination node can beneficially combine both the directly transmitted and the relayed symbols using low-complexity correlation operations combined with a hard-decision detector. Our simulation results demonstrate that the proposed Cooperative Differential STS (CDSTS) scheme is capable of combating the effects of asynchronous uplink transmissions without any Channel State Information (CSI), provided that the maximum synchronization delay of the relay nodes is within the width of IFW. It will be demonstrated that in the frequency-selective environment considered our CDSTS arrangement is capable of exploiting both space-time diversity and multi-path diversity with the aid of a RAKE combiner.","PeriodicalId":6405,"journal":{"name":"2010 IEEE International Conference on Communications","volume":"17 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82479684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信